Malicious Software Infrastructure Easier to Get and Deploy Than Ever
Simple to use and deploy offensive security tools, making it easier than ever for criminals with little technical know-how to get in on …
Simple to use and deploy offensive security tools, making it easier than ever for criminals with little technical know-how to get in on …
Cobalt Strike and Metasploit, two penetration testing toolkits usually employed by security researchers, have been used to host more than a …
Parrot security has announced the release of Parrot Security OS 4.10, which makes the distribution more reliable and more secure. The …
Thousands of people graduate from colleges and universities each year with cybersecurity or computer science degrees only to find employers …
The general availability of ICS-specific intrusion and attack tools is widening the pool of attackers capable of targeting operational …
Black Hat Europe A veteran drone hacker reckons the recent release of the Dronesploit framework won’t go down quite as its inventors hope. …
Researchers detect a wave of malware campaigns from a new hacking group named TA2101 that targeting various organizations in German and …
Despite Metasploit’s over 15 year existence, there are still core techniques that go undetected, allowing malicious actors to evade …
HD Moore, famed developer of the wildly popular Metasploit penetration testing tool, is about to go commercial with a new project he …
The Rapid7 project Metasploit has finally released an exploit for the BlueKeep flaw disclosed in the May Patch Tuesday update. The …
An exploit for BlueKeep, a vulnerability in Microsoft’s Remote Desktop Protocol (RDP) that can allow remote code execution, is the subject …
Metasploit published a public exploit for BlueKeep, the exploit module targets 64-bit versions of Windows 7 and Windows 2008 R2. The …