Posts tagged Research

3 Key Challenges to Clarity in Threat Intelligence: 2023 Forrester Consulting Total Economic Impact™ Study

Threat Research

3 Key Challenges to Clarity in Threat Intelligence: 2023 Forrester Consulting Total Economic Impact™ Study

Stacy Moran's avatar

Stacy Moran

Anarchy in the UK? Not Quite: A look at the cyber health of the FTSE 350

Threat Research

Anarchy in the UK? Not Quite: A look at the cyber health of the FTSE 350

Rapid7's avatar

Rapid7

Rapid7-Observed Exploitation of Adobe ColdFusion

Threat Research

Rapid7-Observed Exploitation of Adobe ColdFusion

Clayton Zechman's avatar

Clayton Zechman

Active Exploitation of ZK Framework CVE-2022-36537

Threat Research

Active Exploitation of ZK Framework CVE-2022-36537

Stephen Fewer's avatar

Stephen Fewer

A Shifting Attack Landscape: Rapid7’s 2022 Vulnerability Intelligence Report

Exposure Management

A Shifting Attack Landscape: Rapid7’s 2022 Vulnerability Intelligence Report

Tom Caiazza's avatar

Tom Caiazza

CIEM is Required for Cloud Security and IAM Providers to Compete: Gartner® Report

Security Operations

CIEM is Required for Cloud Security and IAM Providers to Compete: Gartner® Report

Aaron Wells's avatar

Aaron Wells

A Deep Dive into Reversing CODESYS

Threat Research

A Deep Dive into Reversing CODESYS

Tod Beardsley's avatar

Tod Beardsley

Rapid7 and USF: Building a diverse cybersecurity workforce is not optional

Products and Tools

Rapid7 and USF: Building a diverse cybersecurity workforce is not optional

Rapid7's avatar

Rapid7

Nearly 19,000 ESXi Servers Still Vulnerable to CVE-2021-21974

Detection and Response

Nearly 19,000 ESXi Servers Still Vulnerable to CVE-2021-21974

Erick Galinkin's avatar

Erick Galinkin

Evasion Techniques Uncovered: An Analysis of APT Methods

Detection and Response

Evasion Techniques Uncovered: An Analysis of APT Methods

Christiaan Beek's avatar

Christiaan Beek

Exploitation of GoAnywhere MFT zero-day vulnerability

Threat Research

Exploitation of GoAnywhere MFT zero-day vulnerability

Caitlin Condon's avatar

Caitlin Condon

Rapid7 Observes Use of Microsoft OneNote to Spread Redline Infostealer and Qakbot Malware

Industry Trends

Rapid7 Observes Use of Microsoft OneNote to Spread Redline Infostealer and Qakbot Malware

Rapid7's avatar

Rapid7

Recog Release v3.0.3

Threat Research

Recog Release v3.0.3

Matthew Kienow's avatar

Matthew Kienow

Year in Review: Rapid7 Cybersecurity Research

Threat Research

Year in Review: Rapid7 Cybersecurity Research

Tom Caiazza's avatar

Tom Caiazza

CVE-2022-27510: Critical Citrix ADC and Gateway Remote Authentication Bypass Vulnerabilities

Threat Research

CVE-2022-27510: Critical Citrix ADC and Gateway Remote Authentication Bypass Vulnerabilities

Rapid7's avatar

Rapid7

New Research: Optimizing DAST Vulnerability Triage with Deep Learning

Threat Research

New Research: Optimizing DAST Vulnerability Triage with Deep Learning

Tom Caiazza's avatar

Tom Caiazza

New Research: We’re Still Terrible at Passwords; Making it Easy for Attackers

Threat Research

New Research: We’re Still Terrible at Passwords; Making it Easy for Attackers

Tod Beardsley's avatar

Tod Beardsley

FLEXlm and Citrix ADM Denial of Service Vulnerability

Threat Research

FLEXlm and Citrix ADM Denial of Service Vulnerability

Ron Bowes's avatar

Ron Bowes

Baxter SIGMA Spectrum Infusion Pumps: Multiple Vulnerabilities (FIXED)

Detection and Response

Baxter SIGMA Spectrum Infusion Pumps: Multiple Vulnerabilities (FIXED)

Deral Heiland's avatar

Deral Heiland

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Threat Research

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Erick Galinkin's avatar

Erick Galinkin

25 Years of Nmap: Happy Scan-iversary!

Exposure Management

25 Years of Nmap: Happy Scan-iversary!

Tod Beardsley's avatar

Tod Beardsley