The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

The Updated APT Playbook: Tales from the Kimsuky threat actor group

Threat Research

The Updated APT Playbook: Tales from the Kimsuky threat actor group

Rapid7's avatar

Rapid7

CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)

Threat Research

CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)

Rapid7's avatar

Rapid7

High-Risk Vulnerabilities in ConnectWise ScreenConnect

Threat Research

High-Risk Vulnerabilities in ConnectWise ScreenConnect

Rapid7's avatar

Rapid7

RCE to Sliver: IR Tales from the Field

Threat Research

RCE to Sliver: IR Tales from the Field

Rapid7's avatar

Rapid7

Critical Fortinet FortiOS CVE-2024-21762 Exploited

Threat Research

Critical Fortinet FortiOS CVE-2024-21762 Exploited

Rapid7's avatar

Rapid7

Exploring the (Not So) Secret Code of Black Hunt Ransomware

Threat Research

Exploring the (Not So) Secret Code of Black Hunt Ransomware

Anna Širokova's avatar

Anna Širokova

CVE-2024-0204: Critical Authentication Bypass in Fortra GoAnywhere MFT

Threat Research

CVE-2024-0204: Critical Authentication Bypass in Fortra GoAnywhere MFT

Caitlin Condon's avatar

Caitlin Condon

Critical CVEs in Outdated Versions of Atlassian Confluence and VMware vCenter Server

Threat Research

Critical CVEs in Outdated Versions of Atlassian Confluence and VMware vCenter Server

Rapid7's avatar

Rapid7

Whispers of Atlantida: Safeguarding Your Digital Treasure

Threat Research

Whispers of Atlantida: Safeguarding Your Digital Treasure

Natalie Zargarov's avatar

Natalie Zargarov

2023 Ransomware Stats: A Look Back To Plan Ahead

Threat Research

2023 Ransomware Stats: A Look Back To Plan Ahead

Christiaan Beek's avatar

Christiaan Beek

Zero-Day Exploitation of Ivanti Connect Secure and Policy Secure Gateways

Threat Research

Zero-Day Exploitation of Ivanti Connect Secure and Policy Secure Gateways

Caitlin Condon's avatar

Caitlin Condon

We Asked ChatGPT for 2024 Cybersecurity Predictions but You Should Make These Resolutions Instead

Threat Research

We Asked ChatGPT for 2024 Cybersecurity Predictions but You Should Make These Resolutions Instead

Rapid7's avatar

Rapid7

Peeking into the crystal ball: What 2023 cyber threats told us about 2024

Threat Research

Peeking into the crystal ball: What 2023 cyber threats told us about 2024

Rapid7's avatar

Rapid7

Is That Smart Home Technology Secure? Here’s How You Can Find Out.

Threat Research

Is That Smart Home Technology Secure? Here’s How You Can Find Out.

Deral Heiland's avatar

Deral Heiland

The Risks of Exposing DICOM Data to the Internet

Threat Research

The Risks of Exposing DICOM Data to the Internet

Christiaan Beek's avatar

Christiaan Beek

Critical Vulnerabilities in WS_FTP Server

Threat Research

Critical Vulnerabilities in WS_FTP Server

Caitlin Condon's avatar

Caitlin Condon

Fake Update Utilizes New IDAT Loader To Execute StealC and Lumma Infostealers

Threat Research

Fake Update Utilizes New IDAT Loader To Execute StealC and Lumma Infostealers

Natalie Zargarov's avatar

Natalie Zargarov

Rapid7’s Mid-Year Threat Review

Threat Research

Rapid7’s Mid-Year Threat Review

Tom Caiazza's avatar

Tom Caiazza

Poorly Purged Medical Devices Present Security Concerns After Sale on Secondary Market

Threat Research

Poorly Purged Medical Devices Present Security Concerns After Sale on Secondary Market

Deral Heiland's avatar

Deral Heiland

CVE-2023-35078: Critical API Access Vulnerability in Ivanti Endpoint Manager Mobile

Threat Research

CVE-2023-35078: Critical API Access Vulnerability in Ivanti Endpoint Manager Mobile

Drew Burton's avatar

Drew Burton

The Japanese Technology and Media Attack Landscape

Threat Research

The Japanese Technology and Media Attack Landscape

Tom Caiazza's avatar

Tom Caiazza