Posts tagged Research

Threat Research
Building a Backpack Hypervisor
Brendan Watters

Vulnerabilities and Exploits
Multiple vulnerabilities in Wink and Insteon smart home systems
Sam Huckins

Vulnerabilities and Exploits
Cisco Smart Install Exposure
Jon Hart

Vulnerabilities and Exploits
R7-2017-07: Multiple Fuze TPN Handset Portal vulnerabilities (FIXED)
Sam Huckins

Threat Research
Remote Desktop Protocol (RDP) Exposure
Jon Hart

Detection and Response
Copyright Office Calls For New Cybersecurity Researcher Protections
Harley Geiger

Industry Trends
Rapid7 issues comments on NAFTA renegotiation
Harley Geiger

Threat Research
Signal to Noise in Internet Scanning Research
Jon Hart

Threat Research
The Data Science Process at Rapid7
Roy Hodgman

Threat Research
Research Lead (IoT)
Deral Heiland

Industry Trends
NCSAM: The Danger of Criminalizing Curiosity
Amanda Fountain

Detection and Response
NCSAM: Independent Research and IoT
Tod Beardsley
![Digging for Clam[AV]s with Project Sonar](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Threat Research
Digging for Clam[AV]s with Project Sonar
boB Rudis

Threat Research
The 2016 Verizon Data Breach Investigations Report (DBIR) Summary - The Defender's Perspective
boB Rudis

Threat Research
Petition for Reform of the DMCA and CFAA
Jen Ellis

Threat Research
A Pentester's Introduction to SAP & ABAP
Juan Vazquez

Threat Research
Learn to Pentest SAP with Metasploit As ERP Attacks Go Mainstream
Christian Kirsch

Threat Research
Analysis of the FinFisher Lawful Interception Malware
nex