Posts tagged Labs

Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026

Threat Research

Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026

Deral Heiland's avatar

Deral Heiland

SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums

Threat Research

SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums

Milan Spinka's avatar

Milan Spinka

Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface

Industry Trends

Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface

Jeremy Makowski's avatar

Jeremy Makowski

From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars

Threat Research

From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars

Alexandra Blia's avatar
Gal Givon's avatar

Alexandra Blia, Gal Givon

Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report

Threat Research

Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report

Rapid7's avatar

Rapid7

When Your Calendar Becomes the Compromise

Vulnerabilities and Exploits

When Your Calendar Becomes the Compromise

Rapid7 Labs's avatar

Rapid7 Labs

Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence

Products and Tools

Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence

Stephen Fewer's avatar

Stephen Fewer

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond

Industry Trends

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond

Jeremy Makowski's avatar

Jeremy Makowski

Inside Russian Market: Uncovering the Botnet Empire

Threat Research

Inside Russian Market: Uncovering the Botnet Empire

Alexandra Blia's avatar
Maor Weinberger's avatar

Alexandra Blia, Maor Weinberger

The Business of Cybercrime: Raj Samani on Access, Ransomware, and What Comes Next

Industry Trends

The Business of Cybercrime: Raj Samani on Access, Ransomware, and What Comes Next

Rapid7's avatar

Rapid7

Microsoft SharePoint Zero-Day Exploitation: What Public Sector Leaders Should Know

Threat Research

Microsoft SharePoint Zero-Day Exploitation: What Public Sector Leaders Should Know

Rapid7 Labs's avatar

Rapid7 Labs

Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise

Vulnerabilities and Exploits

Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise

Rapid7's avatar

Rapid7

Compromise for Sale: Inside the Rapid7 2025 Access Brokers Report

Threat Research

Compromise for Sale: Inside the Rapid7 2025 Access Brokers Report

Rapid7's avatar

Rapid7

DisguiseDelimit: Rapid7 talks NAS exploitation at DEF CON 33

Threat Research

DisguiseDelimit: Rapid7 talks NAS exploitation at DEF CON 33

Rapid7's avatar

Rapid7

Q2 2025 Ransomware Trends Analysis: Boom and Bust

Threat Research

Q2 2025 Ransomware Trends Analysis: Boom and Bust

Chris Boyd's avatar

Chris Boyd

Konica Minolta bizhub Multifunction Printer: Pass-Back Attack Vulnerability (NOT FIXED)

Vulnerabilities and Exploits

Konica Minolta bizhub Multifunction Printer: Pass-Back Attack Vulnerability (NOT FIXED)

Deral Heiland's avatar

Deral Heiland

Scattered Spider: Rapid7 Insights, Observations, and Recommendations

Threat Research

Scattered Spider: Rapid7 Insights, Observations, and Recommendations

Rapid7 Labs's avatar

Rapid7 Labs

CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)

Vulnerabilities and Exploits

CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)

Anna Katarina Quinn's avatar

Anna Katarina Quinn

NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign

Vulnerabilities and Exploits

NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign

Anna Širokova's avatar
Ivan Feigl's avatar

Anna Širokova, Ivan Feigl

From Noise to Action: Introducing Intelligence Hub

Threat Research

From Noise to Action: Introducing Intelligence Hub

Raj Samani's avatar
Craig Adams's avatar

Raj Samani, Craig Adams

2025 Ransomware: Business as Usual, Business is Booming

Detection and Response

2025 Ransomware: Business as Usual, Business is Booming

Chris Boyd's avatar

Chris Boyd