Posts tagged Threat Intel

3 min Managed Detection and Response (MDR)

MDR Plus Threat Intel: 414 New Detections in 251 Days (You’re Welcome)

Now, Threat Command’s threat intelligence platform (TIP) content is integrated with our leading detection and response products and services.

2 min Threat Intel

Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls

The Lapsus$ ransomware gang’s modus operandi seems to be evolving.

42 min Cybersecurity

Russia-Ukraine Cybersecurity Updates

This ongoing blog provides the need-to-know updates in cybersecurity and threat intelligence relating to the Russia-Ukraine conflict.

9 min Threat Intel

The Top 5 Russian Cyber Threat Actors to Watch

These 5 threat actors are identified by our Threat Intelligence Research team as the most likely (i.e., highest risk) to carry out cyberattacks against European and US companies.

5 min Threat Intel

For Health Insurance Companies, Web Apps Can Be an Open Wound

Misconfigured web apps can leave your defenses wide open. Here's how health insurance providers can harden their web app security and protect their data.

4 min Threat Intel

The Big Target on Cyber Insurers' Backs

According to our research, cyber insurance providers are highly targeted in the insurance space. Find out why and what they can do to protect themselves.

7 min Threat Intel

What's New in Threat Intelligence: 2021 Year in Review

Last year marked a huge milestone with the acquisition of IntSights by Rapid7, and over the course of 2021, we continued to add value to our products.

3 min Threat Intel

Log4Shell Makes Its Appearance in Hacker Chatter: 4 Observations

The Rapid7 Threat Intelligence team is tracking the attacker's-eye view on Log4Shell and the related chatter on the clear, deep, and dark web.

3 min SOAR

Better Together: XDR, SOAR, Vulnerability Management, and External Threat Intelligence

Effectively prioritizing security incidents comes down to having the right data and intelligence from inside your IT environment and the world outside.

5 min Threat Intel

4 Simple Steps for an Effective Threat Intelligence Program

By following these simple steps, you can implement an effective threat intelligence program that's built for the modern cybersecurity environment.

3 min Detection and Response

SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal

The SANS Institute has conducted its sixth annual Threat Hunting Survey. Read this post for a preview of the survey's findings and its takeaways.

5 min Cybersecurity

[R]Evolution of the Cyber Threat Intelligence Practice

Threat intelligence is transitioning from a separate pillar to a central hub that feeds all the functions of the security organization.

4 min Threat Intel

What It Was Like to Attend Black Hat USA 2021 and DEF CON 29 in Person

I attended Black Hat USA 2021 and DEF CON 29, marking the fifth time that I made this annual pilgrimage to Las Vegas for cybersecurity professionals.

1 min Lost Bots

[The Lost Bots] Episode 1: External Threat Intelligence

Welcome to The Lost Bots, a new vlog series where Rapid7 resident expert and former CISO, Jeffrey Gardner (virtually) sits down with fellow industry experts to spill the tea on current events and trends in the security space.

2 min Threat Intel

Yes, Fraudsters Can Bypass the Strong Customer Authentication (SCA) Requirement

Any new security regulation attracts the attention of fraudsters and cybercriminals. It’s safe to assume they're able to bypass SCA.