Posts tagged Research

Threat Research
When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation
Milan Spinka

Threat Research
Before the Breach: When digital footprints become a strategic cyber risk
Jeremy Makowski

Threat Research
Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare
Rapid7
Threat Research
The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground
Alexandra Blia, Efi Sherman

Threat Research
New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed
Rapid7

Vulnerabilities and Exploits
The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP
Douglas McKee

Vulnerabilities and Exploits
CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)
Stephen Fewer

Threat Research
Measuring AI Security: Separating Signal from Panic
Christiaan Beek

Threat Research
Chrysalis, Notepad++, and Supply Chain Risk: What it Means, and What to Do Next
Rapid7
Threat Research
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Ivan Feigl

Vulnerabilities and Exploits
New Research: Multifunction Printer (MFP) Security Concerns within the Enterprise Business Environment
Deral Heiland, Sam Moses

Vulnerabilities and Exploits
CVE-2025-10573: Ivanti EPM Unauthenticated Stored Cross-Site Scripting (Fixed)
Ryan Emmons

Threat Research
From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars
Alexandra Blia, Gal Givon

Vulnerabilities and Exploits
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
Ryan Emmons

Threat Research
Threat Landscape of the Building and Construction Sector Part Two: Ransomware
Jeremy Makowski

Threat Research
Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report
Rapid7

Threat Research
Threat Landscape of the Building and Construction Sector, Part One: Initial Access, Supply Chain, and the Internet of Things
Jeremy Makowski

Threat Research
Salt Typhoon APT Group: What Public Sector Leaders and Defenders Should Know
Rapid7 Labs

Products and Tools
Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence
Stephen Fewer
Industry Trends
Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond
Jeremy Makowski

Vulnerabilities and Exploits
Rapid7 at Pwn2Own: Raising the Bar in Vuln Intel
Stephen Fewer