Posts tagged Labs

When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise

Threat Research

When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise

Anna Širokova's avatar

Anna Širokova

Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware

Threat Research

Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware

Alexandra Blia's avatar
Ivan Feigl's avatar

Alexandra Blia, Ivan Feigl

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

Industry Trends

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

Craig Adams's avatar

Craig Adams

What’s New in Rapid7 Products and Services: Q1 2026 in Review

Products and Tools

What’s New in Rapid7 Products and Services: Q1 2026 in Review

Ed Montgomery's avatar

Ed Montgomery

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

Threat Research

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

Rapid7 Labs's avatar

Rapid7 Labs

Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing

Threat Research

Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing

Rapid7 Labs's avatar

Rapid7 Labs

BPFdoor in Telecom Networks: Sleeper Cells in the Backbone

Threat Research

BPFdoor in Telecom Networks: Sleeper Cells in the Backbone

Rapid7 Labs's avatar

Rapid7 Labs

The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report

Threat Research

The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report

Rapid7 Labs's avatar

Rapid7 Labs

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Threat Research

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Milan Spinka's avatar

Milan Spinka

Before the Breach: When digital footprints become a strategic cyber risk

Threat Research

Before the Breach: When digital footprints become a strategic cyber risk

Jeremy Makowski's avatar

Jeremy Makowski

Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare

Threat Research

Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare

Rapid7's avatar

Rapid7

The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground

Threat Research

The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground

Alexandra Blia's avatar
Efi Sherman's avatar

Alexandra Blia, Efi Sherman

New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed

Threat Research

New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed

Rapid7's avatar

Rapid7

Carding-as-a-Service: The Underground Market of Stolen Cards

Threat Research

Carding-as-a-Service: The Underground Market of Stolen Cards

Alexandra Blia's avatar
Maor Weinberger's avatar

Alexandra Blia, Maor Weinberger +1

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit

Threat Research

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit

Ivan Feigl's avatar

Ivan Feigl

Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026

Threat Research

Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026

Deral Heiland's avatar

Deral Heiland

SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums

Threat Research

SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums

Milan Spinka's avatar

Milan Spinka

Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface

Industry Trends

Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface

Jeremy Makowski's avatar

Jeremy Makowski

From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars

Threat Research

From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars

Alexandra Blia's avatar
Gal Givon's avatar

Alexandra Blia, Gal Givon

Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report

Threat Research

Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report

Rapid7's avatar

Rapid7

When Your Calendar Becomes the Compromise

Vulnerabilities and Exploits

When Your Calendar Becomes the Compromise

Rapid7 Labs's avatar

Rapid7 Labs