Posts tagged Research

Exposure Management
This One Time on a Pen Test: How I Compromised a Healthcare Portal Before My Hot Cocoa Went Cold
Trevor O'Donnal

Industry Trends
This One Time on a Pen Test: Paging Doctor Hackerman
Nick Powers

Threat Research
New Research: Investigating and Reversing Avionics CAN Bus Systems
Patrick Kiley

Threat Research
Industry Cyber-Exposure Report: FTSE 250+
boB Rudis

Detection and Response
Extracting Firmware from Microcontrollers’ Onboard Flash Memory, Part 4
Deral Heiland

Threat Research
Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 3: Microchip PIC Microcontrollers
Deral Heiland

Threat Research
Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 2: Nordic RF Microcontrollers
Deral Heiland

Detection and Response
Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers
Deral Heiland

Threat Research
Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know
boB Rudis

Threat Research
Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know
boB Rudis

Threat Research
Introducing the Metasploit Development Diaries
Caitlin Condon

Products and Tools
A Serial Problem: Exploitation and Exposure of Java Serialized Objects
Aaron Soto

Threat Research
Buy One Device, Get Data Free: Private Information Remains on Donated Tech
Josh Frantz

Threat Research
Rapid7 Introduces Industry Cyber-Exposure Report: ASX 200
boB Rudis

Threat Research
Cisco® RV110/RV130/RV215 Unauthenticated Configuration Export Vulnerability (CVE-2019-1663): What You Need to Know
boB Rudis

Threat Research
Drupal Core Remote Code Execution (CVE-2019-6340): What You Need to Know
boB Rudis
![[IoT Security] Introduction to Embedded Hardware Hacking](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Threat Research
[IoT Security] Introduction to Embedded Hardware Hacking
Deral Heiland

Threat Research
Level Up Your Internet Intelligence Using the Rapid7 Open Data API and R
boB Rudis

Threat Research
Understanding Ubiquiti Discovery Service Exposures
Jon Hart

Threat Research
Cisco RV320/RV325 Router Unauthenticated Configuration Export Vulnerability (CVE-2019-1653): What You Need to Know
boB Rudis

Threat Research
Happy HaXmas! Year-End Internet Scanning Observations
Jon Hart