Posts tagged Research

Is the Internet of Things the Next Ransomware Target?

Threat Research

Is the Internet of Things the Next Ransomware Target?

Deral Heiland's avatar

Deral Heiland

Open-Source Security: Getting to the Root of the Problem

Threat Research

Open-Source Security: Getting to the Root of the Problem

Matthew Kienow's avatar

Matthew Kienow

Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List

Threat Research

Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List

Erick Galinkin's avatar

Erick Galinkin

A Quick Look at CES 2022

Threat Research

A Quick Look at CES 2022

Deral Heiland's avatar

Deral Heiland

CVE-2021-20038..42: SonicWall SMA 100 Multiple Vulnerabilities (FIXED)

Exposure Management

CVE-2021-20038..42: SonicWall SMA 100 Multiple Vulnerabilities (FIXED)

Jake Baines's avatar

Jake Baines

Metasploit Wrap-Up 12/10/21

Threat Research

Metasploit Wrap-Up 12/10/21

Jeffrey Martin's avatar

Jeffrey Martin

Metasploit Wrap-Up: 12/3/21

Threat Research

Metasploit Wrap-Up: 12/3/21

Spencer McIntyre's avatar

Spencer McIntyre

Metasploit Wrap-Up: Nov. 26 2021

Threat Research

Metasploit Wrap-Up: Nov. 26 2021

Christophe De La Fuente's avatar

Christophe De La Fuente

Metasploit Wrap-Up: 11/19/21

Threat Research

Metasploit Wrap-Up: 11/19/21

Erin Bleiweiss's avatar

Erin Bleiweiss

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 4

Threat Research

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 4

Deral Heiland's avatar

Deral Heiland

Time to Act: Bridging the Gap in Cloud Automation Adoption

Threat Research

Time to Act: Bridging the Gap in Cloud Automation Adoption

Erica Azad's avatar

Erica Azad

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 3

Threat Research

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 3

Deral Heiland's avatar

Deral Heiland

Infostealer Malware Masquerades as Windows Application

Threat Research

Infostealer Malware Masquerades as Windows Application

Andrew Iwamaye's avatar

Andrew Iwamaye

Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 2

Detection and Response

Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 2

Deral Heiland's avatar

Deral Heiland

Recog: Data Rules Everything Around Me

Industry Trends

Recog: Data Rules Everything Around Me

Matthew Kienow's avatar

Matthew Kienow

Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 1

Detection and Response

Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 1

Deral Heiland's avatar

Deral Heiland

For Microsoft Exchange Server Vulnerabilities, Patching Remains Patchy

Exposure Management

For Microsoft Exchange Server Vulnerabilities, Patching Remains Patchy

Tom Sellers's avatar

Tom Sellers

The Ransomware Killchain

Industry Trends

The Ransomware Killchain

Erick Galinkin's avatar

Erick Galinkin

Metasploit Wrap-Up: 9/10/21

Threat Research

Metasploit Wrap-Up: 9/10/21

Louis Sato's avatar

Louis Sato

The Rise of Disruptive Ransomware Attacks: A Call To Action

Industry Trends

The Rise of Disruptive Ransomware Attacks: A Call To Action

boB Rudis's avatar

boB Rudis

Cloud Challenges in the Age of Remote Work: Rapid7’s 2021 Cloud Misconfigurations Report

Threat Research

Cloud Challenges in the Age of Remote Work: Rapid7’s 2021 Cloud Misconfigurations Report

Shelby Matthews's avatar

Shelby Matthews