Coronavirus impacts security conferences and events: check your schedule
With coronavirus starting to take hold globally, international travel restrictions are kicking in and more workplaces are advising to work...
With coronavirus starting to take hold globally, international travel restrictions are kicking in and more workplaces are advising to work...
The world of work is changing—by the minute, it feels these days. With the onset of the global coronavirus pandemic,...
The Security Service of Ukraine (SBU) announced the termination of the acclivities of hackers who stole an average of 1.2...
We recently discovered a new strain of Android malware. The Trojan (detected as: Trojan-Spy.AndroidOS.Cookiethief) turned out to be quite simple....
Dirble is a website directory scanning tool for Windows and Linux. It's designed to be fast to run and easy...
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes...
Rapid7 chief data scientist Bob Rudis, threat intelligence team member Charlie Stafford, and VRM engineering manager Brent Cook also contributed...
Continuously monitoring your network activity for signs of attack is a great way to catch hackers and breaches before they...
By Alexander Elkholy (Threats Analyst) A root privilege escalation and remote execution vulnerability (designated as CVE-2020-8794) has been discovered in...
Cyberattackers continue to seize on the dire need for information surrounding the novel coronavirus. In one of the latest examples,...
Ironically, to keep costs low for their enterprise and mid-market clients, managed service providers (MSPs) are some of the most...
The Federal Bureau of Investigation arrested a Russian citizen who allegedly supported the sale of hacked accounts and personal data...
According to Microsoft, the company was part of a team that took down the global network of zombie bots. Necurs...
As a module-based malware, Trickbot a malware family previously captured by FortiGuard Labs and afterward analyzed in 2016. It can...
Google has stopped advising Microsoft Edge users to switch to Chrome for a more secure experience as the browser extensions...
RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam To Run: You can either run locally...
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order...
In a survey conducted by the Ponemon Institute and Domain Tools, 51% of respondents said they believe that automation will...
By Jaromir Horejsi and Joseph C. Chen (Threat Researchers) We recently discovered a new campaign that we dubbed “Operation Overtrap”...
Following the unexpectedly long list of fixes included in last month’s Patch Tuesday, March brings an even longer one, albeit...
Malicious actors have been secretly embedding the njRAT remote access trojan in free hacking tools as well as cracks of those...
Update: The digital certificate issued for httpsps has been revoked by GlobalSign. Fraudsters are known for using social engineering tricks...
According to Check Point Threat Intelligence, more than 4,000 coronavirus-related domains have been registered worldwide since January 2020. 3% of...
Earlier this year Cisco was in the headlines for the Zero-day vulnerabilities that were discovered in several of its devices...