Posts tagged Research

Pushing Open-Source Security Forward: Insights From Black Hat 2022

Products and Tools

Pushing Open-Source Security Forward: Insights From Black Hat 2022

Jesse Mack's avatar

Jesse Mack

Are Your Apps Exposed? Know Faster With Application Discovery in InsightAppSec

Products and Tools

Are Your Apps Exposed? Know Faster With Application Discovery in InsightAppSec

Ronan McCrory's avatar

Ronan McCrory

Rapid7 Discovered Vulnerabilities in Cisco ASA, ASDM, and FirePOWER Services Software

Vulnerabilities and Exploits

Rapid7 Discovered Vulnerabilities in Cisco ASA, ASDM, and FirePOWER Services Software

Jake Baines's avatar

Jake Baines

CVE-2022-31660 and CVE-2022-31661 (FIXED): VMware Workspace ONE Access, Identity Manager, and vRealize Automation LPE

Threat Research

CVE-2022-31660 and CVE-2022-31661 (FIXED): VMware Workspace ONE Access, Identity Manager, and vRealize Automation LPE

Spencer McIntyre's avatar

Spencer McIntyre

What We're Looking Forward to at Black Hat, DEF CON, and BSidesLV 2022

Threat Research

What We're Looking Forward to at Black Hat, DEF CON, and BSidesLV 2022

Jesse Mack's avatar

Jesse Mack

QNAP Poisoned XML Command Injection (Silently Patched)

Exposure Management

QNAP Poisoned XML Command Injection (Silently Patched)

Jake Baines's avatar

Jake Baines

Primary Arms PII Disclosure via IDOR (FIXED)

Threat Research

Primary Arms PII Disclosure via IDOR (FIXED)

Tod Beardsley's avatar

Tod Beardsley

To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved

Exposure Management

To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved

Tom Caiazza's avatar

Tom Caiazza

Today’s SOC Strategies Will Soon Be Inadequate

Security Operations

Today’s SOC Strategies Will Soon Be Inadequate

Dina Durutlic's avatar

Dina Durutlic

For Finserv Ransomware Attacks, Obtaining Customer Data Is the Focus

Industry Trends

For Finserv Ransomware Attacks, Obtaining Customer Data Is the Focus

Tom Caiazza's avatar

Tom Caiazza

For Ransomware Double-Extorters, It's All About the Benjamins — and Data From Healthcare and Pharma

Exposure Management

For Ransomware Double-Extorters, It's All About the Benjamins — and Data From Healthcare and Pharma

Tom Caiazza's avatar

Tom Caiazza

CVE-2021-3779: Ruby-MySQL Gem Client File Read (FIXED)

Exposure Management

CVE-2021-3779: Ruby-MySQL Gem Client File Read (FIXED)

Tod Beardsley's avatar

Tod Beardsley

CVE-2022-31749: WatchGuard Authenticated Arbitrary File Read/Write (Fixed)

Exposure Management

CVE-2022-31749: WatchGuard Authenticated Arbitrary File Read/Write (Fixed)

Jake Baines's avatar

Jake Baines

New Report Shows What Data Is Most at Risk to (and Prized by) Ransomware Attackers

Threat Research

New Report Shows What Data Is Most at Risk to (and Prized by) Ransomware Attackers

Rapid7's avatar

Rapid7

Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition

Threat Research

Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition

Tom Caiazza's avatar

Tom Caiazza

CVE-2022-32230: Windows SMB Denial-of-Service Vulnerability (FIXED)

Threat Research

CVE-2022-32230: Windows SMB Denial-of-Service Vulnerability (FIXED)

Spencer McIntyre's avatar

Spencer McIntyre

Defending Against Tomorrow's Threats: Insights From RSAC 2022

Threat Research

Defending Against Tomorrow's Threats: Insights From RSAC 2022

Jesse Mack's avatar

Jesse Mack

[VIDEO] An Inside Look at the RSA 2022 Experience From the Rapid7 Team​

Threat Research

[VIDEO] An Inside Look at the RSA 2022 Experience From the Rapid7 Team​

Jesse Mack's avatar

Jesse Mack

Evaluating the Security of an Enterprise IoT Deployment at Domino's Pizza

Detection and Response

Evaluating the Security of an Enterprise IoT Deployment at Domino's Pizza

Deral Heiland's avatar

Deral Heiland

CVE-2022-22977: VMware Guest Authentication Service LPE (FIXED)

Exposure Management

CVE-2022-22977: VMware Guest Authentication Service LPE (FIXED)

Jake Baines's avatar

Jake Baines

A Year on from the Ransomware Task Force Report

Industry Trends

A Year on from the Ransomware Task Force Report

Jen Ellis's avatar

Jen Ellis