Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.


View Cookie Policy for full details

Research  

NICER Protocol Deep Dive: Internet Exposure of NTP

In the latest installment of our NICER Protocol Deep Dive blog series, we take a closer look at the internet exposure of NTP.…

NICER Protocol Deep Dive: Internet Exposure of DNS-over-TLS

In this edition of our NICER Protocol Deep Dive blog series, we'll take a closer look at the internet exposure of DNS-over-TLS.…

NICER Protocol Deep Dive: Internet Exposure of DNS

In this edition of our NICER Protocol Deep Dive blog series, we discuss the internet exposure of DNS.…

HaXmas Hardware Hacking

This HaXmas, I decided to dig around a little in Rapid7's library of IoT investigations that never really went anywhere, just to see which tools were used.…

Rapid7 Labs’ 2020 Naughty List Summary Report to Santa

Your dutiful elves here at Rapid7 Labs have compiled a list of the naughty country networks being used to launch cyberattacks across the globe.…

UPnP With a Holiday Cheer

For today’s discussion, this blog post will only cover the port forwarding services and will also share a Python script you can use to start examining this service.…

NICER Protocol Deep Dive: Internet Exposure of memcached

In this edition of our NICER Protocol Deep Dive blog series, we take a closer look at the internet exposure of memcached.…

NICER Protocol Deep Dive: Internet Exposure of Microsoft SQL Server (MS SQL) (UDP/1434)

In this edition of our NICER Protocol Deep Dive blog series, we cover the internet exposure of the Microsoft SQL Server.…

Behind the Scenes: Under the Hoodie 2020 Video Series

In this blog, we take you on a behind-the-scenes look at the making of our 2020 Under the Hoodie video series.…

Don’t Put It on the Internet: Tesla Backup Gateway Edition

In this blog, we address Tesla Backup Gateways and identify key areas where Tesla could improve security and privacy to help customers protect themselves.…

NICER Protocol Deep Dive: Internet Exposure of MySQL

In the latest edition of our "NICER Protocol Deep Dive blog series, we take a more detailed look at the internet exposure of MySQL.…

This One Time on a Pen Test: How I Hacked a Self-Driving Car

In our latest edition of "This One Time on a Pen Test," we take a deeper look at an engagement involving a self-driving car.…

NICER Protocol Deep Dive: Internet Exposure of Citrix ADC/NetScaler

In this edition of our NICER Protocol Deep Dive blog series, we take a closer look at the internet exposure of Citrix ADC/NetScaler.…

The Story Behind Security Breaches

There are many potential causes of security breaches, but what is a common root cause? Human error.…

Never miss a blog

Get the latest stories, expertise, and news about security today.