Posts tagged Research

Threat Research
Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 2: Nordic RF Microcontrollers
Deral Heiland

Detection and Response
Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers
Deral Heiland

Threat Research
Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know
boB Rudis

Threat Research
Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know
boB Rudis

Threat Research
Introducing the Metasploit Development Diaries
Caitlin Condon

Products and Tools
A Serial Problem: Exploitation and Exposure of Java Serialized Objects
Aaron Soto

Threat Research
Buy One Device, Get Data Free: Private Information Remains on Donated Tech
Josh Frantz

Threat Research
Rapid7 Introduces Industry Cyber-Exposure Report: ASX 200
boB Rudis

Threat Research
Cisco® RV110/RV130/RV215 Unauthenticated Configuration Export Vulnerability (CVE-2019-1663): What You Need to Know
boB Rudis

Threat Research
Drupal Core Remote Code Execution (CVE-2019-6340): What You Need to Know
boB Rudis
![[IoT Security] Introduction to Embedded Hardware Hacking](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Threat Research
[IoT Security] Introduction to Embedded Hardware Hacking
Deral Heiland

Threat Research
Level Up Your Internet Intelligence Using the Rapid7 Open Data API and R
boB Rudis

Threat Research
Understanding Ubiquiti Discovery Service Exposures
Jon Hart

Threat Research
Cisco RV320/RV325 Router Unauthenticated Configuration Export Vulnerability (CVE-2019-1653): What You Need to Know
boB Rudis

Threat Research
Happy HaXmas! Year-End Internet Scanning Observations
Jon Hart

Threat Research
The Ghost of Exploits Past: A Deep Dive into the Morris Worm
William Vu

Threat Research
Once a Haxer, Always a Haxor
Deral Heiland

Threat Research
Rsunk your Battleship: An Ocean of Data Exposed through Rsync
Jon Hart

Threat Research
Charting the Forthcoming PHPocalypse in 2019
boB Rudis

Exposure Management
This One Time on a Pen Test, Part 5: From Physical Security Weakness to Strength
Steve Laura

Exposure Management
Password Tips from a Pen Tester: Are 12-Character Passwords Really Stronger, or Just a Dime a Dozen?
Patrick Laverty