Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities
Wow, this past week has been a pretty long year for Zoom.As the COVID-19 global pandemic moved the whole knowledge-working...
Wow, this past week has been a pretty long year for Zoom.As the COVID-19 global pandemic moved the whole knowledge-working...
At Rapid7, we have the opportunity to talk to security professionals from all types of organizations. Whether we’re conversing with...
A little more than one month after the European Union enacted the General Data Protection Regulation (GDPR) to extend new...
The coronavirus pandemic is forcing many people around the world to work remotely. This has significantly increased the popularity of...
In this particular scam, the recipients receive phishing emails asking them to donate money by filling forms for coronavirus or...
Recently, tens of YouTube accounts were hacked to broadcast a Ponzi cryptocurrency scheme by renaming the hacked YouTube accounts as...
FProbe - Fast HTTP ProbeInstallationGO111MODULE=on go get -u github.com/theblackturtle/fprobeFeaturesTake a list of domains/subdomains and probe for working http/https server.Optimize RAM...
SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing. Supports various...
If you’ve been in the security industry for any amount of time, you’re no stranger to false positives. They show...
With additional insights/analysis from Augusto Remillano II and Don Ovid Ladores Raccoon emerged as Malware as a Service (MaaS) last...
As more and more countries order their citizens inside in response to COVID-19, online shopping—already a widespread practice—has surged in...
According to the report by Rostelecom Solar JSOC, hackers changed the focus of attacks, switching from direct theft of money...
A surge in new cyberspying by a speculated Chinese group that dates as far back as to late January was...
The first step anyone took after hearing the first of the Coronavirus was ‘Googling’ it. Google has been a solution,...
Owing to the lockdown due to the outbreak of the global pandemic Covid-19, people are once again resorting to their...
On December 4, 2019, we discovered watering hole websites that were compromised to selectively trigger a drive-by download attack with...
auspex noun: An augur of ancient Rome, especially one who interpreted omens derived from the observation of birds.awspx is a...
Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. Its focused on discovery of organization...
In a recent episode of Rapid7’s podcast, Security Nation, we talked with Jonathan Cran, Head of Research at Kenna Security....
An unidentified party has reportedly placed the source code for Dharma ransomware up for sale on at least two Russian...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Positive Technologies experts said that the number of network nodes in the Russian Federation accessible via the Remote Desktop Protocol...
If hackers trespass into your smartphones, they can send fake emails, fake alerts using your camera, and even control user...
Windows SMBv3 LPE Exploit AuthorsDaniel García Gutiérrez (@danigargu) Manuel Blanco Parajón (@dialluvioso_) Referenceshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796 https://www.synacktiv.com/posts/exploit/im-smbghost-daba-dee-daba-da.html https://www.fortinet.com/blog/threat-research/cve-2020-0796-memory-corruption-vulnerability-in-windows-10-smb-server.html#.Xndfn0lv150.twitter https://www.mcafee.com/blogs/other-blogs/mcafee-labs/smbghost-analysis-of-cve-2020-0796/ http://blogs.360.cn/post/CVE-2020-0796.html https://blog.zecops.com/vulnerabilities/vulnerability-reproduction-cve-2020-0796-poc/ Download CVE-2020-0796...