Posts tagged Labs

Q2 2025 Ransomware Trends Analysis: Boom and Bust

Threat Research

Q2 2025 Ransomware Trends Analysis: Boom and Bust

Chris Boyd's avatar

Chris Boyd

Konica Minolta bizhub Multifunction Printer: Pass-Back Attack Vulnerability (NOT FIXED)

Vulnerabilities and Exploits

Konica Minolta bizhub Multifunction Printer: Pass-Back Attack Vulnerability (NOT FIXED)

Deral Heiland's avatar

Deral Heiland

Scattered Spider: Rapid7 Insights, Observations, and Recommendations

Threat Research

Scattered Spider: Rapid7 Insights, Observations, and Recommendations

Rapid7 Labs's avatar

Rapid7 Labs

CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)

Vulnerabilities and Exploits

CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)

Anna Katarina Quinn's avatar

Anna Katarina Quinn

NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign

Vulnerabilities and Exploits

NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign

Anna Širokova's avatar
Ivan Feigl's avatar

Anna Širokova, Ivan Feigl

From Noise to Action: Introducing Intelligence Hub

Threat Research

From Noise to Action: Introducing Intelligence Hub

Raj Samani's avatar
Craig Adams's avatar

Raj Samani, Craig Adams

2025 Ransomware: Business as Usual, Business is Booming

Detection and Response

2025 Ransomware: Business as Usual, Business is Booming

Chris Boyd's avatar

Chris Boyd

A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware

Detection and Response

A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware

Rapid7's avatar

Rapid7

Fake BianLian Ransomware Letters in Circulation

Detection and Response

Fake BianLian Ransomware Letters in Circulation

Chris Boyd's avatar

Chris Boyd

How To Protect Your Organization's Bluesky Account From Security Threats

Threat Research

How To Protect Your Organization's Bluesky Account From Security Threats

Chris Boyd's avatar

Chris Boyd

The 2024 Ransomware Landscape: Looking back on another painful year

Threat Research

The 2024 Ransomware Landscape: Looking back on another painful year

Christiaan Beek's avatar

Christiaan Beek

Perfect Fit or Business Threat? How to Mitigate the Risk of Rogue Employees

Threat Research

Perfect Fit or Business Threat? How to Mitigate the Risk of Rogue Employees

Chris Boyd's avatar

Chris Boyd

2024 Threat Landscape Statistics: Ransomware Activity, Vulnerability Exploits, and Attack Trends

Exposure Management

2024 Threat Landscape Statistics: Ransomware Activity, Vulnerability Exploits, and Attack Trends

Rapid7 Labs's avatar

Rapid7 Labs

Ransomware Groups Demystified: CyberVolk Ransomware

Detection and Response

Ransomware Groups Demystified: CyberVolk Ransomware

Rapid7 Labs's avatar

Rapid7 Labs

Ransomware Groups Demystified: Lynx Ransomware

Detection and Response

Ransomware Groups Demystified: Lynx Ransomware

Rapid7 Labs's avatar

Rapid7 Labs

Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.

Threat Research

Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.

Tom Caiazza's avatar

Tom Caiazza

Defending Against APTs: A Learning Exercise with Kimsuky

Threat Research

Defending Against APTs: A Learning Exercise with Kimsuky

Raj Samani's avatar

Raj Samani

What’s New in Rapid7 Products & Services: Q2 2024 in Review

Threat Research

What’s New in Rapid7 Products & Services: Q2 2024 in Review

Margaret Wei's avatar

Margaret Wei

State-Sponsored Threat Actors Target Security Researchers

Vulnerabilities and Exploits

State-Sponsored Threat Actors Target Security Researchers

boB Rudis's avatar

boB Rudis

DOUBLEPULSAR over RDP: Baselining Badness on the Internet

Threat Research

DOUBLEPULSAR over RDP: Baselining Badness on the Internet

Tom Sellers's avatar

Tom Sellers

How I Shut Down a (Test) Factory with a Single Layer 2 Packet

Threat Research

How I Shut Down a (Test) Factory with a Single Layer 2 Packet

Andreas Galauner's avatar

Andreas Galauner