Posts tagged Risk Management

Industry Trends
Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface
Jeremy Makowski

Industry Trends
Pen, Paper, and Preparedness: What the UK's Latest Cyber Guidance Really Means
Emma Burdett

Exposure Management
Preparing for Unknown Risks: How to Better Prepare for Risks You Can't See Yet
Robin Long

Threat Research
Peeking into the crystal ball: What 2023 cyber threats told us about 2024
Rapid7

Exposure Management
Active Exploitation of IBM Aspera Faspex CVE-2022-47986
Caitlin Condon

Exposure Management
CVE-2023-22501: Critical Broken Authentication Flaw in Jira Service Management Products
Caitlin Condon

Detection and Response
Ransomware Campaign Compromising VMware ESXi Servers
Caitlin Condon

Threat Research
Exploitation of GoAnywhere MFT zero-day vulnerability
Caitlin Condon

Industry Trends
Rapid7 Added to Carahsoft GSA Schedule Contract
Rapid7

Exposure Management
CVE-2022-3786 and CVE-2022-3602: Two High-Severity Buffer Overflow Vulnerabilities in OpenSSL Fixed
Rapid7

Vulnerabilities and Exploits
CVE-2021-39144: VMware Cloud Foundation Unauthenticated Remote Code Execution
Caitlin Condon

Exposure Management
CVE-2022-42889: Keep Calm and Stop Saying "Text4Shell"
Erick Galinkin

Exposure Management
CVE-2022-36804: Easily Exploitable Vulnerability in Atlassian Bitbucket Server and Data Center
Ron Bowes

Detection and Response
The 2022 SANS Top New Attacks and Threats Report Is In, and It's Required Reading
Tom Caiazza

Exposure Management
Active Exploitation of Multiple Vulnerabilities in Zimbra Collaboration Suite
Caitlin Condon

Exposure Management
QNAP Poisoned XML Command Injection (Silently Patched)
Jake Baines

Exposure Management
Active Exploitation of Atlassian’s Questions for Confluence App CVE-2022-26138
Glenn Thorpe

Exposure Management
To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved
Tom Caiazza

Exposure Management
Exploitation of Mitel MiVoice Connect SA CVE-2022-29499
Caitlin Condon

Industry Trends
For Finserv Ransomware Attacks, Obtaining Customer Data Is the Focus
Tom Caiazza

Exposure Management
For Ransomware Double-Extorters, It's All About the Benjamins — and Data From Healthcare and Pharma
Tom Caiazza