Posts tagged Research

Poorly Purged Medical Devices Present Security Concerns After Sale on Secondary Market

Threat Research

Poorly Purged Medical Devices Present Security Concerns After Sale on Secondary Market

Deral Heiland's avatar

Deral Heiland

CVE-2023-35078: Critical API Access Vulnerability in Ivanti Endpoint Manager Mobile

Threat Research

CVE-2023-35078: Critical API Access Vulnerability in Ivanti Endpoint Manager Mobile

Drew Burton's avatar

Drew Burton

The Japanese Technology and Media Attack Landscape

Threat Research

The Japanese Technology and Media Attack Landscape

Tom Caiazza's avatar

Tom Caiazza

The Japanese Financial Services Attack Landscape

Threat Research

The Japanese Financial Services Attack Landscape

Tom Caiazza's avatar

Tom Caiazza

Old Blackmoon Trojan, NEW Monetization Approach

Exposure Management

Old Blackmoon Trojan, NEW Monetization Approach

Natalie Zargarov's avatar

Natalie Zargarov

3 Key Challenges to Clarity in Threat Intelligence: 2023 Forrester Consulting Total Economic Impact™ Study

Threat Research

3 Key Challenges to Clarity in Threat Intelligence: 2023 Forrester Consulting Total Economic Impact™ Study

Stacy Moran's avatar

Stacy Moran

Anarchy in the UK? Not Quite: A look at the cyber health of the FTSE 350

Threat Research

Anarchy in the UK? Not Quite: A look at the cyber health of the FTSE 350

Rapid7's avatar

Rapid7

Rapid7-Observed Exploitation of Adobe ColdFusion

Threat Research

Rapid7-Observed Exploitation of Adobe ColdFusion

Clayton Zechman's avatar

Clayton Zechman

Active Exploitation of ZK Framework CVE-2022-36537

Threat Research

Active Exploitation of ZK Framework CVE-2022-36537

Stephen Fewer's avatar

Stephen Fewer

A Shifting Attack Landscape: Rapid7’s 2022 Vulnerability Intelligence Report

Exposure Management

A Shifting Attack Landscape: Rapid7’s 2022 Vulnerability Intelligence Report

Tom Caiazza's avatar

Tom Caiazza

CIEM is Required for Cloud Security and IAM Providers to Compete: Gartner® Report

Security Operations

CIEM is Required for Cloud Security and IAM Providers to Compete: Gartner® Report

Aaron Wells's avatar

Aaron Wells

A Deep Dive into Reversing CODESYS

Threat Research

A Deep Dive into Reversing CODESYS

Tod Beardsley's avatar

Tod Beardsley

Rapid7 and USF: Building a diverse cybersecurity workforce is not optional

Products and Tools

Rapid7 and USF: Building a diverse cybersecurity workforce is not optional

Rapid7's avatar

Rapid7

Nearly 19,000 ESXi Servers Still Vulnerable to CVE-2021-21974

Detection and Response

Nearly 19,000 ESXi Servers Still Vulnerable to CVE-2021-21974

Erick Galinkin's avatar

Erick Galinkin

Evasion Techniques Uncovered: An Analysis of APT Methods

Detection and Response

Evasion Techniques Uncovered: An Analysis of APT Methods

Christiaan Beek's avatar

Christiaan Beek

Exploitation of GoAnywhere MFT zero-day vulnerability

Threat Research

Exploitation of GoAnywhere MFT zero-day vulnerability

Caitlin Condon's avatar

Caitlin Condon

Rapid7 Observes Use of Microsoft OneNote to Spread Redline Infostealer and Qakbot Malware

Industry Trends

Rapid7 Observes Use of Microsoft OneNote to Spread Redline Infostealer and Qakbot Malware

Rapid7's avatar

Rapid7

Recog Release v3.0.3

Threat Research

Recog Release v3.0.3

Matthew Kienow's avatar

Matthew Kienow

Year in Review: Rapid7 Cybersecurity Research

Threat Research

Year in Review: Rapid7 Cybersecurity Research

Tom Caiazza's avatar

Tom Caiazza

CVE-2022-27510: Critical Citrix ADC and Gateway Remote Authentication Bypass Vulnerabilities

Threat Research

CVE-2022-27510: Critical Citrix ADC and Gateway Remote Authentication Bypass Vulnerabilities

Rapid7's avatar

Rapid7

New Research: Optimizing DAST Vulnerability Triage with Deep Learning

Threat Research

New Research: Optimizing DAST Vulnerability Triage with Deep Learning

Tom Caiazza's avatar

Tom Caiazza