Posts tagged Research

Peeking into the crystal ball: What 2023 cyber threats told us about 2024

Threat Research

Peeking into the crystal ball: What 2023 cyber threats told us about 2024

Rapid7's avatar

Rapid7

Is That Smart Home Technology Secure? Here’s How You Can Find Out.

Threat Research

Is That Smart Home Technology Secure? Here’s How You Can Find Out.

Deral Heiland's avatar

Deral Heiland

The Risks of Exposing DICOM Data to the Internet

Threat Research

The Risks of Exposing DICOM Data to the Internet

Christiaan Beek's avatar

Christiaan Beek

Little Crumbs Can Lead To Giants

Products and Tools

Little Crumbs Can Lead To Giants

Christiaan Beek's avatar

Christiaan Beek

Critical Vulnerabilities in WS_FTP Server

Threat Research

Critical Vulnerabilities in WS_FTP Server

Caitlin Condon's avatar

Caitlin Condon

Fake Update Utilizes New IDAT Loader To Execute StealC and Lumma Infostealers

Threat Research

Fake Update Utilizes New IDAT Loader To Execute StealC and Lumma Infostealers

Natalie Zargarov's avatar

Natalie Zargarov

Poorly Purged Medical Devices Present Security Concerns After Sale on Secondary Market

Threat Research

Poorly Purged Medical Devices Present Security Concerns After Sale on Secondary Market

Deral Heiland's avatar

Deral Heiland

CVE-2023-35078: Critical API Access Vulnerability in Ivanti Endpoint Manager Mobile

Threat Research

CVE-2023-35078: Critical API Access Vulnerability in Ivanti Endpoint Manager Mobile

Drew Burton's avatar

Drew Burton

The Japanese Technology and Media Attack Landscape

Threat Research

The Japanese Technology and Media Attack Landscape

Tom Caiazza's avatar

Tom Caiazza

The Japanese Financial Services Attack Landscape

Threat Research

The Japanese Financial Services Attack Landscape

Tom Caiazza's avatar

Tom Caiazza

Old Blackmoon Trojan, NEW Monetization Approach

Exposure Management

Old Blackmoon Trojan, NEW Monetization Approach

Natalie Zargarov's avatar

Natalie Zargarov

3 Key Challenges to Clarity in Threat Intelligence: 2023 Forrester Consulting Total Economic Impact™ Study

Threat Research

3 Key Challenges to Clarity in Threat Intelligence: 2023 Forrester Consulting Total Economic Impact™ Study

Stacy Moran's avatar

Stacy Moran

Anarchy in the UK? Not Quite: A look at the cyber health of the FTSE 350

Threat Research

Anarchy in the UK? Not Quite: A look at the cyber health of the FTSE 350

Rapid7's avatar

Rapid7

Rapid7-Observed Exploitation of Adobe ColdFusion

Threat Research

Rapid7-Observed Exploitation of Adobe ColdFusion

Clayton Zechman's avatar

Clayton Zechman

Active Exploitation of ZK Framework CVE-2022-36537

Threat Research

Active Exploitation of ZK Framework CVE-2022-36537

Stephen Fewer's avatar

Stephen Fewer

A Shifting Attack Landscape: Rapid7’s 2022 Vulnerability Intelligence Report

Exposure Management

A Shifting Attack Landscape: Rapid7’s 2022 Vulnerability Intelligence Report

Tom Caiazza's avatar

Tom Caiazza

CIEM is Required for Cloud Security and IAM Providers to Compete: Gartner® Report

Security Operations

CIEM is Required for Cloud Security and IAM Providers to Compete: Gartner® Report

Aaron Wells's avatar

Aaron Wells

A Deep Dive into Reversing CODESYS

Threat Research

A Deep Dive into Reversing CODESYS

Tod Beardsley's avatar

Tod Beardsley

Rapid7 and USF: Building a diverse cybersecurity workforce is not optional

Products and Tools

Rapid7 and USF: Building a diverse cybersecurity workforce is not optional

Rapid7's avatar

Rapid7

Nearly 19,000 ESXi Servers Still Vulnerable to CVE-2021-21974

Detection and Response

Nearly 19,000 ESXi Servers Still Vulnerable to CVE-2021-21974

Erick Galinkin's avatar

Erick Galinkin

Evasion Techniques Uncovered: An Analysis of APT Methods

Detection and Response

Evasion Techniques Uncovered: An Analysis of APT Methods

Christiaan Beek's avatar

Christiaan Beek