The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
245 Results

Threat Research
The Updated APT Playbook: Tales from the Kimsuky threat actor group
Rapid7

Threat Research
CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)
Rapid7

Threat Research
High-Risk Vulnerabilities in ConnectWise ScreenConnect
Rapid7

Threat Research
RCE to Sliver: IR Tales from the Field
Rapid7

Threat Research
Critical Fortinet FortiOS CVE-2024-21762 Exploited
Rapid7

Threat Research
Exploring the (Not So) Secret Code of Black Hunt Ransomware
Anna Širokova

Threat Research
CVE-2024-0204: Critical Authentication Bypass in Fortra GoAnywhere MFT
Caitlin Condon

Threat Research
Critical CVEs in Outdated Versions of Atlassian Confluence and VMware vCenter Server
Rapid7

Threat Research
Whispers of Atlantida: Safeguarding Your Digital Treasure
Natalie Zargarov

Threat Research
2023 Ransomware Stats: A Look Back To Plan Ahead
Christiaan Beek

Threat Research
Zero-Day Exploitation of Ivanti Connect Secure and Policy Secure Gateways
Caitlin Condon

Threat Research
We Asked ChatGPT for 2024 Cybersecurity Predictions but You Should Make These Resolutions Instead
Rapid7

Threat Research
Peeking into the crystal ball: What 2023 cyber threats told us about 2024
Rapid7

Threat Research
Is That Smart Home Technology Secure? Here’s How You Can Find Out.
Deral Heiland

Threat Research
The Risks of Exposing DICOM Data to the Internet
Christiaan Beek

Threat Research
Critical Vulnerabilities in WS_FTP Server
Caitlin Condon

Threat Research
Fake Update Utilizes New IDAT Loader To Execute StealC and Lumma Infostealers
Natalie Zargarov

Threat Research
Rapid7’s Mid-Year Threat Review
Tom Caiazza

Threat Research
Poorly Purged Medical Devices Present Security Concerns After Sale on Secondary Market
Deral Heiland

Threat Research
CVE-2023-35078: Critical API Access Vulnerability in Ivanti Endpoint Manager Mobile
Drew Burton

Threat Research
The Japanese Technology and Media Attack Landscape
Tom Caiazza