Rapid7 2021 Wrap-Up: Highlights From a Year of Empowering the Protectors

Rapid7 2021 Wrap-Up: Highlights From a Year of Empowering the Protectors

Now that 2022 is fully underway, it's time to wrap up some of the milestones that Rapid7 achieved in 2021. We worked harder than ever last year to help protectors keep their organization's infrastructure secure — even in the face of some of the most difficult threats the security community has dealt with in recent memory. Here's a rundown of some of our biggest moments in that effort from 2021.

Emergent threats and vulnerability disclosures

As always, our Research and Emergent Threat Response teams spent countless hours this year tirelessly bringing you need-to-know information about the most impactful late-breaking security exploits and vulnerabilities. Let's revisit some of the highlights.

Emergent threat reports

Widespread Exploitation of Critical Remote Code Execution in Apache Log4jCVE-2021-34527 (PrintNightmare): What You Need to KnowGitLab Unauthenticated Remote Code Execution CVE-2021-22205 Exploited in the WildCritical vCenter Server File Upload Vulnerability (CVE-2021-22005)Microsoft SAM File Readability CVE-2021-36934: What You Need to KnowProxyShell: More Widespread Exploitation of Microsoft Exchange Servers

Vulnerability disclosures

CVE-2021-3546[78]: Akkadian Console Server Vulnerabilities (FIXED)Fortinet FortiWeb OS Command Injection rapid7 highlights empowering protectors