3 min
Managed Detection and Response (MDR)
MDR Plus Threat Intel: 414 New Detections in 251 Days (You’re Welcome)
Now, Threat Command’s threat intelligence platform (TIP) content is integrated with our leading detection and response products and services.
2 min
Threat Intel
Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls
The Lapsus$ ransomware gang’s modus operandi seems to be evolving.
42 min
Cybersecurity
Russia-Ukraine Cybersecurity Updates
This ongoing blog provides the need-to-know updates in cybersecurity and threat intelligence relating to the Russia-Ukraine conflict.
9 min
Threat Intel
The Top 5 Russian Cyber Threat Actors to Watch
These 5 threat actors are identified by our Threat Intelligence Research team as the most likely (i.e., highest risk) to carry out cyberattacks against European and US companies.
5 min
Threat Intel
For Health Insurance Companies, Web Apps Can Be an Open Wound
Misconfigured web apps can leave your defenses wide open. Here's how health insurance providers can harden their web app security and protect their data.
4 min
Threat Intel
The Big Target on Cyber Insurers' Backs
According to our research, cyber insurance providers are highly targeted in the insurance space. Find out why and what they can do to protect themselves.
7 min
Threat Intel
What's New in Threat Intelligence: 2021 Year in Review
Last year marked a huge milestone with the acquisition of IntSights by Rapid7, and over the course of 2021, we continued to add value to our products.
3 min
Threat Intel
Log4Shell Makes Its Appearance in Hacker Chatter: 4 Observations
The Rapid7 Threat Intelligence team is tracking the attacker's-eye view on Log4Shell and the related chatter on the clear, deep, and dark web.
3 min
SOAR
Better Together: XDR, SOAR, Vulnerability Management, and External Threat Intelligence
Effectively prioritizing security incidents comes down to having the right data and intelligence from inside your IT environment and the world outside.
5 min
Threat Intel
4 Simple Steps for an Effective Threat Intelligence Program
By following these simple steps, you can implement an effective threat intelligence program that's built for the modern cybersecurity environment.
3 min
Detection and Response
SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal
The SANS Institute has conducted its sixth annual Threat Hunting Survey. Read this post for a preview of the survey's findings and its takeaways.
5 min
Cybersecurity
[R]Evolution of the Cyber Threat Intelligence Practice
Threat intelligence is transitioning from a separate pillar to a central hub that feeds all the functions of the security organization.
4 min
Threat Intel
What It Was Like to Attend Black Hat USA 2021 and DEF CON 29 in Person
I attended Black Hat USA 2021 and DEF CON 29, marking the fifth time that I made this annual pilgrimage to Las Vegas for cybersecurity professionals.
1 min
Lost Bots
[The Lost Bots] Episode 1: External Threat Intelligence
Welcome to The Lost Bots, a new vlog series where Rapid7 resident expert and former CISO, Jeffrey Gardner (virtually) sits down with fellow industry experts to spill the tea on current events and trends in the security space.
2 min
Threat Intel
Yes, Fraudsters Can Bypass the Strong Customer Authentication (SCA) Requirement
Any new security regulation attracts the attention of fraudsters and cybercriminals. It’s safe to assume they're able to bypass SCA.