Posts tagged Research

Extracting Firmware from Microcontrollers' 
Onboard Flash Memory, Part 2: Nordic RF Microcontrollers

Threat Research

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 2: Nordic RF Microcontrollers

Deral Heiland's avatar

Deral Heiland

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Detection and Response

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Deral Heiland's avatar

Deral Heiland

Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know

Threat Research

Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know

boB Rudis's avatar

boB Rudis

Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know

Threat Research

Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know

boB Rudis's avatar

boB Rudis

Introducing the Metasploit Development Diaries

Threat Research

Introducing the Metasploit Development Diaries

Caitlin Condon's avatar

Caitlin Condon

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

Products and Tools

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

Aaron Soto's avatar

Aaron Soto

Buy One Device, Get Data Free: Private Information Remains on Donated Tech

Threat Research

Buy One Device, Get Data Free: Private Information Remains on Donated Tech

Josh Frantz's avatar

Josh Frantz

Rapid7 Introduces Industry Cyber-Exposure Report: ASX 200

Threat Research

Rapid7 Introduces Industry Cyber-Exposure Report: ASX 200

boB Rudis's avatar

boB Rudis

Cisco® RV110/RV130/RV215 Unauthenticated Configuration Export Vulnerability (CVE-2019-1663): What You Need to Know

Threat Research

Cisco® RV110/RV130/RV215 Unauthenticated Configuration Export Vulnerability (CVE-2019-1663): What You Need to Know

boB Rudis's avatar

boB Rudis

Drupal Core Remote Code Execution (CVE-2019-6340): What You Need to Know

Threat Research

Drupal Core Remote Code Execution (CVE-2019-6340): What You Need to Know

boB Rudis's avatar

boB Rudis

[IoT Security] Introduction to Embedded Hardware Hacking

Threat Research

[IoT Security] Introduction to Embedded Hardware Hacking

Deral Heiland's avatar

Deral Heiland

Level Up Your Internet Intelligence Using the Rapid7 Open Data API and R

Threat Research

Level Up Your Internet Intelligence Using the Rapid7 Open Data API and R

boB Rudis's avatar

boB Rudis

Understanding Ubiquiti Discovery Service Exposures

Threat Research

Understanding Ubiquiti Discovery Service Exposures

Jon Hart's avatar

Jon Hart

Cisco RV320/RV325 Router Unauthenticated Configuration Export Vulnerability (CVE-2019-1653): What You Need to Know

Threat Research

Cisco RV320/RV325 Router Unauthenticated Configuration Export Vulnerability (CVE-2019-1653): What You Need to Know

boB Rudis's avatar

boB Rudis

Happy HaXmas! Year-End Internet Scanning Observations

Threat Research

Happy HaXmas! Year-End Internet Scanning Observations

Jon Hart's avatar

Jon Hart

The Ghost of Exploits Past: A Deep Dive into the Morris Worm

Threat Research

The Ghost of Exploits Past: A Deep Dive into the Morris Worm

William Vu's avatar

William Vu

Once a Haxer, Always a Haxor

Threat Research

Once a Haxer, Always a Haxor

Deral Heiland's avatar

Deral Heiland

Rsunk your Battleship: An Ocean of Data Exposed through Rsync

Threat Research

Rsunk your Battleship: An Ocean of Data Exposed through Rsync

Jon Hart's avatar

Jon Hart

Charting the Forthcoming PHPocalypse in 2019

Threat Research

Charting the Forthcoming PHPocalypse in 2019

boB Rudis's avatar

boB Rudis

This One Time on a Pen Test, Part 5: From Physical Security Weakness to Strength

Exposure Management

This One Time on a Pen Test, Part 5: From Physical Security Weakness to Strength

Steve Laura's avatar

Steve Laura

Password Tips from a Pen Tester: Are 12-Character Passwords Really Stronger, or Just a Dime a Dozen?

Exposure Management

Password Tips from a Pen Tester: Are 12-Character Passwords Really Stronger, or Just a Dime a Dozen?

Patrick Laverty's avatar

Patrick Laverty