Rapid7 Threat Report

Using threat intelligence and data science to shed light on your unique threat landscape

The “threat landscape” is a moving, shifting form that will look different to different organizations—it all depends on where you are standing. Some people may be staring at a wide open grassland where the landscape is understood and the threats are easy to identify (though no less deadly), and others may be facing a dense jungle of hidden threats. While it's possible to develop a universal threat landscape that may be useful for general security research and developing high-level incident response frameworks, it is more useful for defenders to have a solid understanding of their own unique threat landscape.

The Rapid7 Quarterly Threat Report leverages intelligence from Rapid7’s extensive network—including the Rapid7 Insight platform, Rapid7 Managed Services, Rapid7 Incident Response engagements, Project Sonar, Heisenberg Cloud, and the Metasploit community—to put this shifting landscape into perspective. It gives you a clear picture of the threats that you face within your unique industry, and how those threats change throughout the year. 

Download the latest report: Download the second quarterly Rapid7 Threat Report for a breakdown of the threat landscape organizations faced during Q2 2017, including the role headline-grabbing events like the WannaCry ransomware played. To hear more from Rapid7's Threat Intelligence Lead Rebekah Brown, read her blog post here.

 

Also available: Rapid7 Quarterly Threat Report, 2017 Q1

 

Read the press release to learn more about Rapid7's dedication to collaboration and information sharing among the cybersecurity community. 

3-Minute Overview

In this Whiteboard Wednesday, Bob Rudis highlights three key lessons from the Q2 2017 Threat Report.

Watch Now

Webcast: August 15
2 p.m. ET/11 a.m. PT

Hear directly from the researchers on the key takeaways and lessons learned from Rapid7's second quarterly Threat Report.

Register Now

Attackers did not move on; they realized that even though we thought we were safe against these non-zero-day, unexciting attacks, we were not.

– Rapid7 Quarterly Threat Report 2017 Q2

These threat events do not happen in a vacuum; the second quarter of 2017 was chock full of large-scale attacks with varying degrees of impact that touched almost every organization in some way, shape, or form.

– Rapid7 Quarterly Threat Report 2017 Q2

Our advice to defenders is to stay vigilant, even when there is a high-profile attack going on. Do not micro-focus on the specific IOCs related to a single event.

– Rapid7 Quarterly Threat Report 2017 Q2

All told, there are several million devices exposing one or more of these services with a questionable security track record.

– Rapid7 Quarterly Threat Report 2017 Q2

Learn From the Experts: Threat Intelligence and Incident Response

Threat Intelligence: And How It Informs a Security Program

Rebekah Brown, threat intelligence lead at Rapid7, discusses how threat intelligence fits into a larger security program.

Threat Intelligence: The Role Metasploit Plays Managed Detection & Response: The Only MDR with UBA Threat Intelligence: Building a Threat Intel Program Managed Detection & Response: Demand More Than an MSSP

Resource

How to Build Threat Intelligence into your Incident Detection and Response Strategy


In this on-demand webcast, learn how to leverage threat intelligence as a critical component in breach prevention, detection, and investigation.

View now

Podcast

The State of Threat Intelligence


Listen Now