Posts tagged Research

8 Tips for Securing Networks When Time Is Scarce

Threat Research

8 Tips for Securing Networks When Time Is Scarce

Erick Galinkin's avatar

Erick Galinkin

Cloud Pentesting, Pt. 1: Breaking Down the Basics

Exposure Management

Cloud Pentesting, Pt. 1: Breaking Down the Basics

Eric Mortaro's avatar

Eric Mortaro

Graph Analysis of the Conti Ransomware Group Internal Chats

Detection and Response

Graph Analysis of the Conti Ransomware Group Internal Chats

Rapid7's avatar

Rapid7

CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)

Threat Research

CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)

Jake Baines's avatar

Jake Baines

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Threat Research

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Rapid7's avatar

Rapid7

Log4Shell 2 Months Later: Security Strategies for the Internet's New Normal

Exposure Management

Log4Shell 2 Months Later: Security Strategies for the Internet's New Normal

Jesse Mack's avatar

Jesse Mack

Prudent Cybersecurity Preparation for the Potential Russia-Ukraine Conflict

Industry Trends

Prudent Cybersecurity Preparation for the Potential Russia-Ukraine Conflict

boB Rudis's avatar

boB Rudis

Dropping Files on a Domain Controller Using CVE-2021-43893

Exposure Management

Dropping Files on a Domain Controller Using CVE-2021-43893

Jake Baines's avatar

Jake Baines

Metasploit Wrap-Up: Feb. 11, 2022

Threat Research

Metasploit Wrap-Up: Feb. 11, 2022

Christophe De La Fuente's avatar

Christophe De La Fuente

Evolving How We Share Rapid7 Research Data

Products and Tools

Evolving How We Share Rapid7 Research Data

Rapid7's avatar

Rapid7

The Big Target on Cyber Insurers' Backs

Threat Research

The Big Target on Cyber Insurers' Backs

Paul Prudhomme's avatar

Paul Prudhomme

Is the Internet of Things the Next Ransomware Target?

Threat Research

Is the Internet of Things the Next Ransomware Target?

Deral Heiland's avatar

Deral Heiland

Open-Source Security: Getting to the Root of the Problem

Threat Research

Open-Source Security: Getting to the Root of the Problem

Matthew Kienow's avatar

Matthew Kienow

Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List

Threat Research

Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List

Erick Galinkin's avatar

Erick Galinkin

A Quick Look at CES 2022

Threat Research

A Quick Look at CES 2022

Deral Heiland's avatar

Deral Heiland

CVE-2021-20038..42: SonicWall SMA 100 Multiple Vulnerabilities (FIXED)

Exposure Management

CVE-2021-20038..42: SonicWall SMA 100 Multiple Vulnerabilities (FIXED)

Jake Baines's avatar

Jake Baines

Metasploit Wrap-Up 12/10/21

Threat Research

Metasploit Wrap-Up 12/10/21

Jeffrey Martin's avatar

Jeffrey Martin

Metasploit Wrap-Up: 12/3/21

Threat Research

Metasploit Wrap-Up: 12/3/21

Spencer McIntyre's avatar

Spencer McIntyre

Metasploit Wrap-Up: Nov. 26 2021

Threat Research

Metasploit Wrap-Up: Nov. 26 2021

Christophe De La Fuente's avatar

Christophe De La Fuente

Metasploit Wrap-Up: 11/19/21

Threat Research

Metasploit Wrap-Up: 11/19/21

Erin Bleiweiss's avatar

Erin Bleiweiss

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 4

Threat Research

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 4

Deral Heiland's avatar

Deral Heiland