Posts tagged Research

New Research: Multifunction Printer (MFP) Security Concerns within the Enterprise Business Environment

Vulnerabilities and Exploits

New Research: Multifunction Printer (MFP) Security Concerns within the Enterprise Business Environment

Deral Heiland's avatar
Sam Moses's avatar

Deral Heiland, Sam Moses

CVE-2025-10573: Ivanti EPM Unauthenticated Stored Cross-Site Scripting (Fixed)

Vulnerabilities and Exploits

CVE-2025-10573: Ivanti EPM Unauthenticated Stored Cross-Site Scripting (Fixed)

Ryan Emmons's avatar

Ryan Emmons

From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars

Threat Research

From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars

Alexandra Blia's avatar
Gal Givon's avatar

Alexandra Blia, Gal Givon

CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)

Vulnerabilities and Exploits

CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)

Ryan Emmons's avatar

Ryan Emmons

Threat Landscape of the Building and Construction Sector Part Two: Ransomware

Threat Research

Threat Landscape of the Building and Construction Sector Part Two: Ransomware

Jeremy Makowski's avatar

Jeremy Makowski

Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report

Threat Research

Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report

Rapid7's avatar

Rapid7

Threat Landscape of the Building and Construction Sector, Part One: Initial Access, Supply Chain, and the Internet of Things

Threat Research

Threat Landscape of the Building and Construction Sector, Part One: Initial Access, Supply Chain, and the Internet of Things

Jeremy Makowski's avatar

Jeremy Makowski

Salt Typhoon APT Group: What Public Sector Leaders and Defenders Should Know

Threat Research

Salt Typhoon APT Group: What Public Sector Leaders and Defenders Should Know

Rapid7 Labs's avatar

Rapid7 Labs

Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence

Products and Tools

Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence

Stephen Fewer's avatar

Stephen Fewer

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond

Industry Trends

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond

Jeremy Makowski's avatar

Jeremy Makowski

Rapid7 at Pwn2Own: Raising the Bar in Vuln Intel

Vulnerabilities and Exploits

Rapid7 at Pwn2Own: Raising the Bar in Vuln Intel

Stephen Fewer's avatar

Stephen Fewer

Independent Results Confirm Rapid7’s NGAV Delivers Strong, Reliable Protection

Products and Tools

Independent Results Confirm Rapid7’s NGAV Delivers Strong, Reliable Protection

Avi Ashkenazi's avatar

Avi Ashkenazi

Inside Russian Market: Uncovering the Botnet Empire

Threat Research

Inside Russian Market: Uncovering the Botnet Empire

Alexandra Blia's avatar
Maor Weinberger's avatar

Alexandra Blia, Maor Weinberger

The Business of Cybercrime: Raj Samani on Access, Ransomware, and What Comes Next

Industry Trends

The Business of Cybercrime: Raj Samani on Access, Ransomware, and What Comes Next

Rapid7's avatar

Rapid7

Microsoft SharePoint Zero-Day Exploitation: What Public Sector Leaders Should Know

Threat Research

Microsoft SharePoint Zero-Day Exploitation: What Public Sector Leaders Should Know

Rapid7 Labs's avatar

Rapid7 Labs

Rapid7 Q2 2025 Incident Response Findings

Detection and Response

Rapid7 Q2 2025 Incident Response Findings

Chris Boyd's avatar

Chris Boyd

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 2)

Threat Research

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 2)

Anna Katarina Quinn's avatar

Anna Katarina Quinn

Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise

Vulnerabilities and Exploits

Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise

Rapid7's avatar

Rapid7

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 1)

Threat Research

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 1)

Anna Katarina Quinn's avatar

Anna Katarina Quinn

Inside the Ransomware Economy in 2025: Q2 Trends & Key Insights You Need to Know

Industry Trends

Inside the Ransomware Economy in 2025: Q2 Trends & Key Insights You Need to Know

Emma Burdett's avatar

Emma Burdett

Q2 2025 Ransomware Trends Analysis: Boom and Bust

Threat Research

Q2 2025 Ransomware Trends Analysis: Boom and Bust

Chris Boyd's avatar

Chris Boyd