Posts tagged Labs

Threat Research
When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation
Milan Spinka

Threat Research
Before the Breach: When digital footprints become a strategic cyber risk
Jeremy Makowski

Threat Research
Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare
Rapid7
Threat Research
The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground
Alexandra Blia, Efi Sherman

Threat Research
New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed
Rapid7
Threat Research
Carding-as-a-Service: The Underground Market of Stolen Cards
Alexandra Blia, Maor Weinberger +1
Threat Research
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Ivan Feigl

Threat Research
Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026
Deral Heiland

Threat Research
SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums
Milan Spinka

Industry Trends
Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface
Jeremy Makowski

Threat Research
From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars
Alexandra Blia, Gal Givon

Threat Research
Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report
Rapid7

Vulnerabilities and Exploits
When Your Calendar Becomes the Compromise
Rapid7 Labs

Products and Tools
Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence
Stephen Fewer
Industry Trends
Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond
Jeremy Makowski

Threat Research
Inside Russian Market: Uncovering the Botnet Empire
Alexandra Blia, Maor Weinberger

Industry Trends
The Business of Cybercrime: Raj Samani on Access, Ransomware, and What Comes Next
Rapid7

Threat Research
Microsoft SharePoint Zero-Day Exploitation: What Public Sector Leaders Should Know
Rapid7 Labs

Vulnerabilities and Exploits
Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise
Rapid7

Threat Research
Compromise for Sale: Inside the Rapid7 2025 Access Brokers Report
Rapid7

Threat Research
DisguiseDelimit: Rapid7 talks NAS exploitation at DEF CON 33
Rapid7