Posts tagged Research

CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection

Vulnerabilities and Exploits

CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection

Jake Baines's avatar

Jake Baines

[Infographic] Cloud Misconfigurations: Don't Become a Breach Statistic

Threat Research

[Infographic] Cloud Misconfigurations: Don't Become a Breach Statistic

Rapid7's avatar

Rapid7

2022 Cloud Misconfigurations Report: Cloud Security Breaches and Attack Trends

Threat Research

2022 Cloud Misconfigurations Report: Cloud Security Breaches and Attack Trends

Jacob Roundy's avatar

Jacob Roundy

CVE-2022-28810: ManageEngine ADSelfService Plus Authenticated Command Execution (Fixed)

Exposure Management

CVE-2022-28810: ManageEngine ADSelfService Plus Authenticated Command Execution (Fixed)

Jake Baines's avatar

Jake Baines

CVE-2022-24527: Microsoft Connected Cache Local Privilege Escalation (Fixed)

Exposure Management

CVE-2022-24527: Microsoft Connected Cache Local Privilege Escalation (Fixed)

Jake Baines's avatar

Jake Baines

Lessons in IoT Hacking: How to Dead-Bug a BGA Flash Memory Chip

Detection and Response

Lessons in IoT Hacking: How to Dead-Bug a BGA Flash Memory Chip

Deral Heiland's avatar

Deral Heiland

Cloud Pentesting, Pt. 3: The Impact of Ecosystem Maturity

Exposure Management

Cloud Pentesting, Pt. 3: The Impact of Ecosystem Maturity

Eric Mortaro's avatar

Eric Mortaro

Cloud Pentesting, Pt. 2: Testing Across Different Deployments

Exposure Management

Cloud Pentesting, Pt. 2: Testing Across Different Deployments

Eric Mortaro's avatar

Eric Mortaro

CVE-2022-1026: Kyocera Net View Address Book Exposure

Threat Research

CVE-2022-1026: Kyocera Net View Address Book Exposure

Tod Beardsley's avatar

Tod Beardsley

Analyzing the Attack Landscape: Rapid7’s 2021 Vulnerability Intelligence Report

Exposure Management

Analyzing the Attack Landscape: Rapid7’s 2021 Vulnerability Intelligence Report

Caitlin Condon's avatar

Caitlin Condon

8 Tips for Securing Networks When Time Is Scarce

Threat Research

8 Tips for Securing Networks When Time Is Scarce

Erick Galinkin's avatar

Erick Galinkin

Cloud Pentesting, Pt. 1: Breaking Down the Basics

Exposure Management

Cloud Pentesting, Pt. 1: Breaking Down the Basics

Eric Mortaro's avatar

Eric Mortaro

Graph Analysis of the Conti Ransomware Group Internal Chats

Detection and Response

Graph Analysis of the Conti Ransomware Group Internal Chats

Rapid7's avatar

Rapid7

CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)

Threat Research

CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)

Jake Baines's avatar

Jake Baines

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Threat Research

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Rapid7's avatar

Rapid7

Log4Shell 2 Months Later: Security Strategies for the Internet's New Normal

Exposure Management

Log4Shell 2 Months Later: Security Strategies for the Internet's New Normal

Jesse Mack's avatar

Jesse Mack

Prudent Cybersecurity Preparation for the Potential Russia-Ukraine Conflict

Industry Trends

Prudent Cybersecurity Preparation for the Potential Russia-Ukraine Conflict

boB Rudis's avatar

boB Rudis

Dropping Files on a Domain Controller Using CVE-2021-43893

Exposure Management

Dropping Files on a Domain Controller Using CVE-2021-43893

Jake Baines's avatar

Jake Baines

Metasploit Wrap-Up: Feb. 11, 2022

Threat Research

Metasploit Wrap-Up: Feb. 11, 2022

Christophe De La Fuente's avatar

Christophe De La Fuente

Evolving How We Share Rapid7 Research Data

Products and Tools

Evolving How We Share Rapid7 Research Data

Rapid7's avatar

Rapid7

The Big Target on Cyber Insurers' Backs

Threat Research

The Big Target on Cyber Insurers' Backs

Paul Prudhomme's avatar

Paul Prudhomme