Posts tagged Labs

Threat Research
When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise
Anna Širokova

Threat Research
Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware
Alexandra Blia, Ivan Feigl

Industry Trends
Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect
Craig Adams
Products and Tools
What’s New in Rapid7 Products and Services: Q1 2026 in Review
Ed Montgomery

Threat Research
New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay
Rapid7 Labs

Threat Research
Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing
Rapid7 Labs

Threat Research
BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
Rapid7 Labs

Threat Research
The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report
Rapid7 Labs

Threat Research
When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation
Milan Spinka

Threat Research
Before the Breach: When digital footprints become a strategic cyber risk
Jeremy Makowski

Threat Research
Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare
Rapid7
Threat Research
The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground
Alexandra Blia, Efi Sherman

Threat Research
New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed
Rapid7
Threat Research
Carding-as-a-Service: The Underground Market of Stolen Cards
Alexandra Blia, Maor Weinberger +1
Threat Research
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Ivan Feigl

Threat Research
Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026
Deral Heiland

Threat Research
SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums
Milan Spinka

Industry Trends
Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface
Jeremy Makowski

Threat Research
From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars
Alexandra Blia, Gal Givon

Threat Research
Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report
Rapid7

Vulnerabilities and Exploits
When Your Calendar Becomes the Compromise
Rapid7 Labs