Posts tagged Research

Threat Research
New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay
Rapid7 Labs

Threat Research
BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
Rapid7 Labs

Threat Research
New Whitepaper: Exploiting Cellular-based IoT Devices
Deral Heiland

Vulnerabilities and Exploits
CVE-2026-31381, CVE-2026-31382: Gainsight Assist Information Disclosure and Cross-Site Scripting (FIXED)
Christopher O’Boyle

Threat Research
The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report
Rapid7 Labs

Threat Research
When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation
Milan Spinka

Threat Research
Before the Breach: When digital footprints become a strategic cyber risk
Jeremy Makowski

Threat Research
Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare
Rapid7
Threat Research
The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground
Alexandra Blia, Efi Sherman

Threat Research
New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed
Rapid7

Vulnerabilities and Exploits
The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP
Douglas McKee

Vulnerabilities and Exploits
CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)
Stephen Fewer

Threat Research
Measuring AI Security: Separating Signal from Panic
Christiaan Beek

Threat Research
Chrysalis, Notepad++, and Supply Chain Risk: What it Means, and What to Do Next
Rapid7
Threat Research
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Ivan Feigl

Vulnerabilities and Exploits
New Research: Multifunction Printer (MFP) Security Concerns within the Enterprise Business Environment
Deral Heiland, Sam Moses

Vulnerabilities and Exploits
CVE-2025-10573: Ivanti EPM Unauthenticated Stored Cross-Site Scripting (Fixed)
Ryan Emmons

Threat Research
From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars
Alexandra Blia, Gal Givon

Vulnerabilities and Exploits
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
Ryan Emmons

Threat Research
Threat Landscape of the Building and Construction Sector Part Two: Ransomware
Jeremy Makowski

Threat Research
Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report
Rapid7