The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
245 Results
Threat Research
Carding-as-a-Service: The Underground Market of Stolen Cards
Alexandra Blia, Maor Weinberger +1

Threat Research
Measuring AI Security: Separating Signal from Panic
Christiaan Beek

Threat Research
Chrysalis, Notepad++, and Supply Chain Risk: What it Means, and What to Do Next
Rapid7
Threat Research
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Ivan Feigl

Threat Research
Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026
Deral Heiland

Threat Research
SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums
Milan Spinka

Threat Research
From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars
Alexandra Blia, Gal Givon

Threat Research
Threat Landscape of the Building and Construction Sector Part Two: Ransomware
Jeremy Makowski

Threat Research
Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report
Rapid7

Threat Research
Threat Landscape of the Building and Construction Sector, Part One: Initial Access, Supply Chain, and the Internet of Things
Jeremy Makowski

Threat Research
Salt Typhoon APT Group: What Public Sector Leaders and Defenders Should Know
Rapid7 Labs

Threat Research
Inside Russian Market: Uncovering the Botnet Empire
Alexandra Blia, Maor Weinberger

Threat Research
Crimson Collective: A New Threat Group Observed Operating in the Cloud
Jakub Zvarik

Threat Research
Microsoft SharePoint Zero-Day Exploitation: What Public Sector Leaders Should Know
Rapid7 Labs
Threat Research
An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 2)
Anna Katarina Quinn

Threat Research
Compromise for Sale: Inside the Rapid7 2025 Access Brokers Report
Rapid7

Threat Research
DisguiseDelimit: Rapid7 talks NAS exploitation at DEF CON 33
Rapid7

Threat Research
An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 1)
Anna Katarina Quinn

Threat Research
Q2 2025 Ransomware Trends Analysis: Boom and Bust
Chris Boyd

Threat Research
Emerging Trends in AI-Related Cyberthreats in 2025: Impacts on Organizational Cybersecurity
Jeremy Makowski

Threat Research
Filch Stealer: A new infostealer leveraging old techniques
Ivan Feigl