Posts tagged Incident Response

ClickFix Phishing Campaign Masquerading as a Claude Installer

Vulnerabilities and Exploits

ClickFix Phishing Campaign Masquerading as a Claude Installer

Nicholas Spagnola's avatar

Nicholas Spagnola

FortiGate CVE-2025-59718 Exploitation: Incident Response Findings

Vulnerabilities and Exploits

FortiGate CVE-2025-59718 Exploitation: Incident Response Findings

Eric Carey's avatar
Olivia Henderson's avatar

Eric Carey, Olivia Henderson +1

Identifying and Mitigating Potential Velociraptor Abuse

Products and Tools

Identifying and Mitigating Potential Velociraptor Abuse

Christiaan Beek's avatar

Christiaan Beek

Rapid7 Q2 2025 Incident Response Findings

Detection and Response

Rapid7 Q2 2025 Incident Response Findings

Chris Boyd's avatar

Chris Boyd

Akira Ransomware Group Utilizing SonicWall Devices for Initial Access

Detection and Response

Akira Ransomware Group Utilizing SonicWall Devices for Initial Access

Rapid7's avatar

Rapid7

Introducing Rapid7 Incident Command: The Future of AI-Powered Security Operations Is Here

Artificial Intelligence

Introducing Rapid7 Incident Command: The Future of AI-Powered Security Operations Is Here

Craig Adams's avatar

Craig Adams

Innovative Tunnelling and Forensic Tool Abuse: IR Tales from the Field

Detection and Response

Innovative Tunnelling and Forensic Tool Abuse: IR Tales from the Field

Noah Hemker's avatar

Noah Hemker

BlackSuit Continues Social Engineering Attacks in Wake of Black Basta’s Internal Conflict

Vulnerabilities and Exploits

BlackSuit Continues Social Engineering Attacks in Wake of Black Basta’s Internal Conflict

Tyler McGraw's avatar

Tyler McGraw

Rapid7 Q1 2025 Incident Response Findings

Detection and Response

Rapid7 Q1 2025 Incident Response Findings

Chris Boyd's avatar

Chris Boyd

Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware

Detection and Response

Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware

Tyler McGraw's avatar

Tyler McGraw

Investigating a SharePoint Compromise: IR Tales from the Field

Detection and Response

Investigating a SharePoint Compromise: IR Tales from the Field

Noah Hemker's avatar

Noah Hemker

Malvertising Campaign Leads to Execution of Oyster Backdoor

Detection and Response

Malvertising Campaign Leads to Execution of Oyster Backdoor

Rapid7's avatar

Rapid7

Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators

Detection and Response

Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators

Rapid7's avatar

Rapid7

RCE to Sliver: IR Tales from the Field

Threat Research

RCE to Sliver: IR Tales from the Field

Noah Hemker's avatar

Noah Hemker

Grey Time: The Hidden Cost of Incident Response

Detection and Response

Grey Time: The Hidden Cost of Incident Response

Joshua Harr's avatar

Joshua Harr

Incident Reporting Regulations Summary and Chart

Industry Trends

Incident Reporting Regulations Summary and Chart

Harley Geiger's avatar

Harley Geiger

Avoiding Smash and Grab Under the SEC’s Proposed Cyber Rule

Detection and Response

Avoiding Smash and Grab Under the SEC’s Proposed Cyber Rule

Harley Geiger's avatar

Harley Geiger

How to Strategically Scale Vendor Management and Supply Chain Security

Detection and Response

How to Strategically Scale Vendor Management and Supply Chain Security

AJ Debole's avatar

AJ Debole

Sharpen Your IR Capabilities With Rapid7’s Detection and Response Workshop

Detection and Response

Sharpen Your IR Capabilities With Rapid7’s Detection and Response Workshop

Mikayla Wyman's avatar

Mikayla Wyman

New US Law to Require Cyber Incident Reports

Industry Trends

New US Law to Require Cyber Incident Reports

Harley Geiger's avatar

Harley Geiger

Cybersecurity as Digital Detective Work: DFIR and Its 3 Key Components

Detection and Response

Cybersecurity as Digital Detective Work: DFIR and Its 3 Key Components

Jesse Mack's avatar

Jesse Mack