5 min
Threat Intel
4 Simple Steps for an Effective Threat Intelligence Program
By following these simple steps, you can implement an effective threat intelligence program that's built for the modern cybersecurity environment.
1 min
Detection and Response
Velociraptor to Announce Winners of Its 2021 Contributor Competition
Velociraptor and Rapid7 are excited to announce the winners of our 2021 Velociraptor Contributor Competition on Friday, October 8.
4 min
Detection and Response
What's New in InsightIDR: Q3 2021 in Review
This post offers a closer look at some of the recent updates and releases in InsightIDR, our extended detection and response solution, from Q3 2021.
1 min
Lost Bots
[The Lost Bots] Episode 6: D&R + VM = WINNING!
In this episode, Practice Advisor Devin Krugly joins to discuss how Detection and Response + Vulnerability Management = a winning combination.
3 min
Detection and Response
SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal
The SANS Institute has conducted its sixth annual Threat Hunting Survey. Read this post for a preview of the survey's findings and its takeaways.
3 min
Detection and Response
Cybersecurity as Digital Detective Work: DFIR and Its 3 Key Components
We highlight 3 elements of a well-formulated digital forensics and incident response (DFIR) strategy.
1 min
Lost Bots
[The Lost Bots] Episode 4: Deception Technology
In this episode of The Lost Bots, Jeffrey talks one-on-one with you about one of his favorite subjects: deception technology.
5 min
Cybersecurity
[R]Evolution of the Cyber Threat Intelligence Practice
Threat intelligence is transitioning from a separate pillar to a central hub that feeds all the functions of the security organization.
4 min
Cybersecurity
Cybercriminals Selling Access to Compromised Networks: 3 Surprising Research Findings
To help fend off network compromise events and curb breach sales, we decided to analyze why and how criminals sell their network access.
1 min
Cybersecurity
[The Lost Bots] Bonus Episode: Velociraptor Contributor Competition
In this extra installment of The Lost Bots, Mike Cohen tells Jeffrey about Velociraptor's 2021 Contributor Competition.
1 min
Cybersecurity
[The Lost Bots] Episode 3: Stories From the SOC
In this third episode, Jeffrey is joined by Stephen Davis, a Technical Lead and Customer Advisor on Rapid7’s Managed Detection and Response team. Stephen shares a story about a phishing attack on an organization
3 min
Cybersecurity
When One Door Opens, Keep It Open: A New Tool for Physical Security Testing
We’ve come up with a neat little device that pentesters can use to recreate the thought process of attackers — and help organizations outsmart them.
10 min
Cybersecurity
Reforming the UK’s Computer Misuse Act
The CMA is the UK’s anti-hacking law, and we've provided feedback on the issues we see with the legislation.
8 min
Ransomware
Slot Machines and Cybercrime: Why Ransomware Won't Quit Pulling Our Lever
Ransomware remains a significant problem, partly because the incentives for everyone, including victims, are there to increase the number of ransomware attacks.
7 min
Ransomware
The Ransomware Task Force: A New Approach to Fighting Ransomware
The Institute for Security and Technology put together a comprehensive Ransomware Task Force (RTF) to identify new approaches to shift the dynamics of ransomware and reduce opportunities for attackers.