Posts tagged Research

Rapid7 Q1 2025 Incident Response Findings

Detection and Response

Rapid7 Q1 2025 Incident Response Findings

Chris Boyd's avatar

Chris Boyd

CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)

Vulnerabilities and Exploits

CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)

Anna Katarina Quinn's avatar

Anna Katarina Quinn

NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign

Vulnerabilities and Exploits

NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign

Anna Širokova's avatar
Ivan Feigl's avatar

Anna Širokova, Ivan Feigl

Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)

Threat Research

Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)

Ryan Emmons's avatar

Ryan Emmons

2025 Ransomware: Business as Usual, Business is Booming

Detection and Response

2025 Ransomware: Business as Usual, Business is Booming

Chris Boyd's avatar

Chris Boyd

A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware

Detection and Response

A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware

Rapid7's avatar

Rapid7

Fake BianLian Ransomware Letters in Circulation

Detection and Response

Fake BianLian Ransomware Letters in Circulation

Chris Boyd's avatar

Chris Boyd

CVE-2025-1094: PostgreSQL psql SQL injection (FIXED)

Threat Research

CVE-2025-1094: PostgreSQL psql SQL injection (FIXED)

Stephen Fewer's avatar

Stephen Fewer

How To Protect Your Organization's Bluesky Account From Security Threats

Threat Research

How To Protect Your Organization's Bluesky Account From Security Threats

Chris Boyd's avatar

Chris Boyd

The 2024 Ransomware Landscape: Looking back on another painful year

Threat Research

The 2024 Ransomware Landscape: Looking back on another painful year

Christiaan Beek's avatar

Christiaan Beek

Perfect Fit or Business Threat? How to Mitigate the Risk of Rogue Employees

Threat Research

Perfect Fit or Business Threat? How to Mitigate the Risk of Rogue Employees

Chris Boyd's avatar

Chris Boyd

New Research: Enhancing Botnet Detection with AI using LLMs and Similarity Search

Security Operations

New Research: Enhancing Botnet Detection with AI using LLMs and Similarity Search

Tom Caiazza's avatar

Tom Caiazza

Out With the Old, In With the New: Securely Disposing of Smart Devices

Threat Research

Out With the Old, In With the New: Securely Disposing of Smart Devices

Deral Heiland's avatar

Deral Heiland

2024 Threat Landscape Statistics: Ransomware Activity, Vulnerability Exploits, and Attack Trends

Exposure Management

2024 Threat Landscape Statistics: Ransomware Activity, Vulnerability Exploits, and Attack Trends

Rapid7 Labs's avatar

Rapid7 Labs

New “CleverSoar” Installer Targets Chinese and Vietnamese Users

Vulnerabilities and Exploits

New “CleverSoar” Installer Targets Chinese and Vietnamese Users

Natalie Zargarov's avatar

Natalie Zargarov

A Bag of RATs: VenomRAT vs. AsyncRAT

Threat Research

A Bag of RATs: VenomRAT vs. AsyncRAT

Anna Širokova's avatar

Anna Širokova

Multiple Vulnerabilities in Wowza Streaming Engine (Fixed)

Threat Research

Multiple Vulnerabilities in Wowza Streaming Engine (Fixed)

Ryan Emmons's avatar

Ryan Emmons

LodaRAT: Established Malware, New Victim Patterns

Threat Research

LodaRAT: Established Malware, New Victim Patterns

Natalie Zargarov's avatar

Natalie Zargarov

Ransomware Groups Demystified: CyberVolk Ransomware

Detection and Response

Ransomware Groups Demystified: CyberVolk Ransomware

Rapid7 Labs's avatar

Rapid7 Labs

New Research: The Proliferation of Cellular in IoT

Threat Research

New Research: The Proliferation of Cellular in IoT

Rapid7's avatar

Rapid7

Defending Against APTs: A Learning Exercise with Kimsuky

Threat Research

Defending Against APTs: A Learning Exercise with Kimsuky

Raj Samani's avatar

Raj Samani