3 min
Threat Intel
The CISO as an Ethical Leader: Building Accountability Into Cybersecurity
It’s important that cybersecurity leaders reinforce ethical practices in guarding against data loss.
3 min
Threat Intel
Insider-Assisted Attacks Prove Costly for Telecoms
Here are some instances in which telecom companies were breached with the help of an insider.
3 min
Threat Intel
Sending the All-Clear Signal: The Implications of WhatsApp’s New Data Privacy Policy
Popular messaging app WhatsApp announced new data privacy policy changes set to debut on February 8, much to the chagrin of its massive user base.
3 min
Threat Intel
3 Security Regulations Automotive Companies Need to Know
A Rapid7 research report breaking down the cyber threat landscape in the automotive industry shows cyberattacks in the sector have risen rapidly.
2 min
Threat Intel
Leaked YouTube Credentials Growing in Popularity on Dark Web Forums
Rapid7 researchers have observed a new trend in black markets and cybercrime forums: stolen credentials for prominent YouTube accounts.
2 min
Research
Rapid7 2020 Threat Report: Exposing Common Attacker Trends
In this blog, we break-down the three key sections of the newly-released Rapid7 2020 Threat Report.
2 min
Threat Intel
Kilos: The Dark Web’s Newest – and Most Extensive – Search Engine
Kilos allows buyers to search for products across numerous dark web sites.
2 min
Threat Intel
Why and Where Cybercriminals Attack the Hospitality Industry
The gaming, leisure, and hospitality industry has been increasingly targeted by cybercrime and faces a unique set of security challenges.
3 min
Threat Intel
What Really Happened to the Dark Web Insider Trading Forum KickAss?
The dark web forum KickAss was apparently seized by the US government, but there is much speculation over what really happened.
5 min
Threat Intel
How Retailers Can Protect Against Magecart This Black Friday and Holiday Season
Online credit card-skimming malware Magecart is now a looming threat to nearly every retailer this Black Friday and throughout the rest of the holiday season (and beyond).
2 min
Threat Intel
Hacking as a Service: How This New Offering Is Changing the Threat Landscape
Just like other industries have adopted the as-a-service model, cyber threat actors are doing the same.
4 min
Threat Intel
How Cybercriminals Use Pinterest to Run Fraud Scams
There are a variety of scams hackers can run on Pinterest, but for this post, we’ll focus on fraud and financial scams.
4 min
Threat Intel
Rapid7 Threat Intelligence Book Club: ‘Countdown to Zero Day’ Recap
The final section of Kim Zetter's “Countdown to Zero Day”pulls together the many factors that are present in attacks such as Stuxnet.
5 min
Threat Intel
HUMINT: The Riskiest (and Most Valuable) Form of Intelligence Gathering
As threat actors make their attacks more difficult to see and stop, human intelligence (HUMINT) has become critical for cybersecurity success.
4 min
Threat Intel
The Top Threat Actors Targeting Financial Services Organizations
This post discusses the key motivations and supporters behind cybercrime groups and lists the top groups that target financial services organizations.