As requested, your dutiful elves here at Rapid7 Labs have compiled a list of the naughty country networks being used to launch cyberattacks across the globe....
Cosmin Iordache is the first bug bounty hunter to earn more than $2,000,000 in bounty awards through the vulnerability coordination and bug bounty program HackerOne. HackerOne...
Media agencies are increasingly facing threats of cyberattacks not just by hit-and-run threat actors but also sophisticated and well-skilled state-sponsored APT groups. Attackers are using several...
Emotet, the nefarious banking trojan that evolved into a downloader, is active again just days before Christmas. The attackers are already known for using various local...
The Golden Gate also known as the Mercy Gate (R) and the Dome of the Rock at the Al-Aqsa mosques compound in Jerusalem’s Old City(photo credit:...
Hackers affiliated with the Russian government have reportedly accessed emails from at least one company in the private sector and accessed Microsoft cloud customers’ information through...
Internet domain company GoDaddy used a holiday bonus notification to test employees on email phishing scams, after workers had already been told they would not receive...
Sabre Corp. will make a $2.4 million payout and shore up its cybersecurity policies under an agreement with 27 state attorneys general who investigated a breach...
Although the COVID-19 pandemic continues to spread and disrupt lives, businesses, and economies, a ray of hope seems to have appeared at the end of the...
The environment where updates for the company’s software were developed was reportedly protected by a password anyone could guess. In the wake of the SolarWinds hack,...