Posts tagged Labs

Threat Research
Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026
Deral Heiland

Threat Research
SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums
Milan Spinka

Industry Trends
Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface
Jeremy Makowski

Threat Research
From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars
Alexandra Blia, Gal Givon

Threat Research
Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report
Rapid7

Vulnerabilities and Exploits
When Your Calendar Becomes the Compromise
Rapid7 Labs

Products and Tools
Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence
Stephen Fewer
Industry Trends
Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond
Jeremy Makowski

Threat Research
Inside Russian Market: Uncovering the Botnet Empire
Alexandra Blia, Maor Weinberger

Industry Trends
The Business of Cybercrime: Raj Samani on Access, Ransomware, and What Comes Next
Rapid7

Threat Research
Microsoft SharePoint Zero-Day Exploitation: What Public Sector Leaders Should Know
Rapid7 Labs

Vulnerabilities and Exploits
Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise
Rapid7

Threat Research
Compromise for Sale: Inside the Rapid7 2025 Access Brokers Report
Rapid7

Threat Research
DisguiseDelimit: Rapid7 talks NAS exploitation at DEF CON 33
Rapid7

Threat Research
Q2 2025 Ransomware Trends Analysis: Boom and Bust
Chris Boyd

Vulnerabilities and Exploits
Konica Minolta bizhub Multifunction Printer: Pass-Back Attack Vulnerability (NOT FIXED)
Deral Heiland

Threat Research
Scattered Spider: Rapid7 Insights, Observations, and Recommendations
Rapid7 Labs

Vulnerabilities and Exploits
CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)
Anna Katarina Quinn

Vulnerabilities and Exploits
NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign
Anna Širokova, Ivan Feigl

Threat Research
From Noise to Action: Introducing Intelligence Hub
Raj Samani, Craig Adams

Detection and Response
2025 Ransomware: Business as Usual, Business is Booming
Chris Boyd