Posts tagged Detection and Response

Rapid7: 7 years of recognition in Gartner® Magic Quadrant™ for SIEM

Detection and Response

Rapid7: 7 years of recognition in Gartner® Magic Quadrant™ for SIEM

Cindy Stanton's avatar

Cindy Stanton

Innovative Tunnelling and Forensic Tool Abuse: IR Tales from the Field

Detection and Response

Innovative Tunnelling and Forensic Tool Abuse: IR Tales from the Field

Rapid7's avatar

Rapid7

Key Takeaways from the Take Command Summit 2025: Outpacing the Adversary – Red Teaming in a Complex Threat Landscape

Industry Trends

Key Takeaways from the Take Command Summit 2025: Outpacing the Adversary – Red Teaming in a Complex Threat Landscape

Rapid7's avatar

Rapid7

Key Takeaways from the Take Command Summit 2025: Demystifying Cloud Detection & Response – The Future of SOC and MDR

Industry Trends

Key Takeaways from the Take Command Summit 2025: Demystifying Cloud Detection & Response – The Future of SOC and MDR

Rapid7's avatar

Rapid7

Active exploitation of SAP NetWeaver Visual Composer CVE-2025-31324

Exposure Management

Active exploitation of SAP NetWeaver Visual Composer CVE-2025-31324

Caitlin Condon's avatar

Caitlin Condon

Password Spray Attacks Taking Advantage of Lax MFA

Products and Tools

Password Spray Attacks Taking Advantage of Lax MFA

Chris Boyd's avatar

Chris Boyd

Fortinet Firewalls Hit with New Zero-Day Attack, Older Data Leak

Detection and Response

Fortinet Firewalls Hit with New Zero-Day Attack, Older Data Leak

Caitlin Condon's avatar

Caitlin Condon

Modular Java Backdoor Dropped in Cleo Exploitation Campaign

Detection and Response

Modular Java Backdoor Dropped in Cleo Exploitation Campaign

Christiaan Beek's avatar

Christiaan Beek

Widespread Exploitation of Cleo File Transfer Software (CVE-2024-55956)

Detection and Response

Widespread Exploitation of Cleo File Transfer Software (CVE-2024-55956)

Rapid7's avatar

Rapid7

Investigating a SharePoint Compromise: IR Tales from the Field

Detection and Response

Investigating a SharePoint Compromise: IR Tales from the Field

Rapid7's avatar

Rapid7

Three Recommendations for Creating a Risk-Based Detection and Response Program

Detection and Response

Three Recommendations for Creating a Risk-Based Detection and Response Program

Rapid7's avatar

Rapid7

VMware ESXi CVE-2024-37085 Targeted in Ransomware Campaigns

Detection and Response

VMware ESXi CVE-2024-37085 Targeted in Ransomware Campaigns

Rapid7's avatar

Rapid7

Supply Chain Compromise Leads to Trojanized Installers for Notezilla, RecentX, Copywhiz

Detection and Response

Supply Chain Compromise Leads to Trojanized Installers for Notezilla, RecentX, Copywhiz

Rapid7's avatar

Rapid7

Malvertising Campaign Leads to Execution of Oyster Backdoor

Detection and Response

Malvertising Campaign Leads to Execution of Oyster Backdoor

Rapid7's avatar

Rapid7

CVE-2024-4978: Backdoored Justice AV Solutions Viewer Software Used in Apparent Supply Chain Attack

Vulnerabilities and Exploits

CVE-2024-4978: Backdoored Justice AV Solutions Viewer Software Used in Apparent Supply Chain Attack

Rapid7's avatar

Rapid7

Rapid7 Recognized in the 2024 Gartner® Magic Quadrant™ for SIEM

Detection and Response

Rapid7 Recognized in the 2024 Gartner® Magic Quadrant™ for SIEM

Meaghan Buchanan's avatar

Meaghan Buchanan

Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators

Detection and Response

Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators

Rapid7's avatar

Rapid7

Velociraptor 0.7.2 Release: Digging Deeper than Ever with EWF Support, Dynamic DNS and More

Detection and Response

Velociraptor 0.7.2 Release: Digging Deeper than Ever with EWF Support, Dynamic DNS and More

Rapid7's avatar

Rapid7

RCE to Sliver: IR Tales from the Field

Threat Research

RCE to Sliver: IR Tales from the Field

Rapid7's avatar

Rapid7

Velociraptor 0.7.1 Release

Detection and Response

Velociraptor 0.7.1 Release

Rapid7's avatar

Rapid7

Mastering Industrial Cybersecurity: The Significance of Combining Vulnerability Management with Detection and Response

Detection and Response

Mastering Industrial Cybersecurity: The Significance of Combining Vulnerability Management with Detection and Response

Rapid7's avatar

Rapid7