The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
271 Results

Vulnerabilities and Exploits
CVE-2020-6287: Critical Vulnerability in SAP NetWeaver Application Server (AS) Java
Rapid7

Vulnerabilities and Exploits
CVE-2020-2021 Authentication Bypass in PAN-OS Security Assertion Markup Language (SAML) Authentication Disclosed
boB Rudis

Vulnerabilities and Exploits
May 2020 Cisco Remote Vulnerabilities Guidance
boB Rudis

Vulnerabilities and Exploits
CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability Remediation Guidance and Exposure Overview
boB Rudis

Vulnerabilities and Exploits
R7-2019-39 | CVE-2019-5648: LDAP Credential Exposure in Barracuda Load Balancer ADC (FIXED)
Sam Huckins

Vulnerabilities and Exploits
Rapid7 Analysis and Guidance: CDPwn (CVE-2020-3118)
Brent Cook

Vulnerabilities and Exploits
R7-2019-40: Bloomsky SKY2 Weather Camera Station Data Authenticity and Exposure Vulnerabilities
Tod Beardsley

Vulnerabilities and Exploits
IoT Vuln Disclosure: Children's GPS Smart Watches (R7-2019-57)
Tod Beardsley

Vulnerabilities and Exploits
R7-2019-09 | CVE-2019-5617, CVE-2019-5643, CVE-2019-5644: C4G BLIS authentication and authorization vulnerabilities (FIXED)
Sam Huckins

Vulnerabilities and Exploits
August 2019 Microsoft Remote Desktop Services (RDP) Patches: What You Need to Know
boB Rudis

Vulnerabilities and Exploits
BlueKeep Exploits May Be Coming: Our Observations and Recommendations
boB Rudis

Vulnerabilities and Exploits
Zoom Video Snooping Security Flaw (CVE-2019-13450): What You Need to Know
Tod Beardsley

Vulnerabilities and Exploits
R7-2018-43: Username Enumeration in Okta SSO Del Auth through Response Timing
Tod Beardsley

Vulnerabilities and Exploits
R7-2019-01: CircuitWerkes Sicon-8 Client-Side Authentication Read-Only Bypass (CVE-2019-5616)
Tod Beardsley

Vulnerabilities and Exploits
Stack-Based Buffer Overflow Attacks: Explained and Examples
Brendan Watters

Vulnerabilities and Exploits
PHP Extension and Application Repository (PEAR) Compromise: What You Need to Know
boB Rudis

Vulnerabilities and Exploits
R7-2018-52: Guardzilla IoT Video Camera Hard-Coded Credential (CVE-2018-5560)
Tod Beardsley

Vulnerabilities and Exploits
Prioritizing the Fundamentals of Coordinated Vulnerability Disclosure
Harley Geiger

Vulnerabilities and Exploits
Shoring Up the Defenses Together: 2018Q2 and Q3 Wrap-Up
Sam Huckins

Vulnerabilities and Exploits
How Cybercriminals Use Pinterest to Run Fraud Scams
Orin Mor

Vulnerabilities and Exploits
How to Automate Identifying and Take Down Malicious Social Media Profiles
Omer Shahak