Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Rapid7

Below you will find reports with the source of “Rapid7”

image from Ransomware Data Disclosure Trends

Ransomware Data Disclosure Trends

This report investigates the trends, pioneered by the Maze ransomware group, of double extortion. In particular, we examine the contents of initial data disclosures intended to coerce victims to pay ransoms. (more available)
Added: June 16, 2022
image from Under the Hoodie 2019

Under the Hoodie 2019

A review of 180 engagements performed by Rapid7 consulting, supplemented by a survey of questions given to all Rapid7 consulting customers. (more available)
Added: August 28, 2020
image from Under the Hoodie 2020

Under the Hoodie 2020

A review of lessons learned over the past year from Rapid7’s penetration testing services. Combined with survey day on social engineering and red team simulations of 206 engagements. (more available)
Added: August 28, 2020
image from Industry Cyber-Exposure Report: ASX 200

Industry Cyber-Exposure Report: ASX 200

Using information from Rapid7’s Project Sonar internet telemetry service, this report reviews several dimensions of demonstrated security controls for companies in the S&P 200 and ASX (Australian) stock indices. (more available)
Added: March 16, 2019
image from Quarterly Threat Report

Quarterly Threat Report

This issue of the Rapid7 Quarterly Threat Report takes a deep dive into the threat landscape for 2018 Q4 and looks more broadly at 2018 as a whole. (more available)
Added: March 6, 2019
image from Industry Cyber-Exposure Report: Fortune 500

Industry Cyber-Exposure Report: Fortune 500

From the report, “To understand current levels of exposure and resiliency, Rapid7 Labs measured 4532 of the 2017 Fortune 500 List3 for: • Overall attack surface (the number of exposed servers/devices); • Presence of dangerous or insecure services; • Phishing defense posture; • Evidence of system compromise; • Weak public service and metadata configurations; and • Joint third-party website dependency risks. (more available)
Added: February 9, 2019
image from National Exposure Index 2018

National Exposure Index 2018

In 2016, Rapid7 Labs launched the National Exposure Index in order to get a measurable, quantitative answer to a fairly fundamental question: What is the nature of internet exposure—services that either do not offer modern cryptographic protection, or are otherwise unsuitable to offer on the increasingly hostile internet—and where, physically, are these exposed services located? (more available)
Added: February 9, 2019
image from Quarterly Threat Report: Q1 2018

Quarterly Threat Report: Q1 2018

From the report, “This quarter’s report covers three main areas of concern for the modern IT defender: • First, credential theft, reuse, and subsequent suspicious logins are—today— the most commonly reported significant incident we’re seeing across both small (<1,000 endpoints) and large organizations (≥1,000 endpoints). (more available)
Added: February 9, 2019
image from Quarterly Threat Report: Q3 2018

Quarterly Threat Report: Q3 2018

It’s harvest time (at least here in the United States), and as we prepare to reap the bounties of the land, so too have we seen attackers make good use of the exploits they’ve sown and infrastructure they’ve co-opted. (more available)
Added: January 15, 2019
image from Quarterly Threat Report Q2 2018

Quarterly Threat Report Q2 2018

This Quarterly report continues Rapid7’s excellent work of providing insight to the threats they have witnessed during the 2nd Quarter of 2018. (more available)
Added: October 26, 2018
image from National Exposure Index

National Exposure Index

The term “exposure” can mean many things. In the context of this report, they define “exposure” as offering services that either expose potentially sensitive data over cleartext channels or are widely recognized to be unwise to make available on the internet, such as database systems. (more available)
Added: October 25, 2018
image from National Exposure Index 2017

National Exposure Index 2017

From The Report, “This year, we continue this investigation into the risk of passive eavesdropping and active attack on the internet, and offer insight into the year-over-year changes involving these exposed services. (more available)
Added: October 24, 2018
image from Prepare For Battle:Building An Incident Response Plan

Prepare For Battle:Building An Incident Response Plan

This report provides a walkthrough of creating an Incident Response Plan.
Added: October 23, 2018
image from 7 Best Practices For Cybersecurity

7 Best Practices For Cybersecurity

This is a helpful little report that simplifies the best practices for Cybersecurity.
Added: October 22, 2018
image from Under The Hoodie: Lessons From A Season Of Penetration Testing

Under The Hoodie: Lessons From A Season Of Penetration Testing

This report offers insight from the research and results of Rapid7’s repeated penetration testing.
Added: October 17, 2018
image from Quarterly Threat Report:Fourth Quarter 2017

Quarterly Threat Report:Fourth Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they wrap up the cyber events from the year 2017 and lay out some thoughts on what is ahead in 2018. (more available)
Added: October 16, 2018
image from Quarterly Threat Report:Third Quarter 2017

Quarterly Threat Report:Third Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they sought to make a less chaotic picture of the events of the 3rd quarter of 2017. (more available)
Added: October 15, 2018
image from Quarterly Threat Report:Second Quarter 2017

Quarterly Threat Report:Second Quarter 2017

This is Rapid7’s Quarterly Threat Report, in this report they sought to include composite and industry-level views of events across many industries. (more available)
Added: October 14, 2018
image from Quarterly Threat Report:First Quarter 2017

Quarterly Threat Report:First Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they have created additional views by day, hour, and event type by industry to give you a glimpse into both the workload variety and volume facing these unsung heroes of cybersecurity. (more available)
Added: October 13, 2018
image from The Four Pillars Of Modern Vulnerability Management

The Four Pillars Of Modern Vulnerability Management

This report breaks down four strategic pillars of handling vulnerability management.
Added: October 12, 2018
© Cyentia Institute 2023
Library updated: February 1, 2023 20:09 UTC (build 051771c)