Posts tagged Research

A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware

Detection and Response

A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware

Rapid7's avatar

Rapid7

Fake BianLian Ransomware Letters in Circulation

Detection and Response

Fake BianLian Ransomware Letters in Circulation

Chris Boyd's avatar

Chris Boyd

CVE-2025-1094: PostgreSQL psql SQL injection (FIXED)

Threat Research

CVE-2025-1094: PostgreSQL psql SQL injection (FIXED)

Stephen Fewer's avatar

Stephen Fewer

How To Protect Your Organization's Bluesky Account From Security Threats

Threat Research

How To Protect Your Organization's Bluesky Account From Security Threats

Chris Boyd's avatar

Chris Boyd

The 2024 Ransomware Landscape: Looking back on another painful year

Threat Research

The 2024 Ransomware Landscape: Looking back on another painful year

Christiaan Beek's avatar

Christiaan Beek

Perfect Fit or Business Threat? How to Mitigate the Risk of Rogue Employees

Threat Research

Perfect Fit or Business Threat? How to Mitigate the Risk of Rogue Employees

Chris Boyd's avatar

Chris Boyd

New Research: Enhancing Botnet Detection with AI using LLMs and Similarity Search

Security Operations

New Research: Enhancing Botnet Detection with AI using LLMs and Similarity Search

Tom Caiazza's avatar

Tom Caiazza

Out With the Old, In With the New: Securely Disposing of Smart Devices

Threat Research

Out With the Old, In With the New: Securely Disposing of Smart Devices

Deral Heiland's avatar

Deral Heiland

2024 Threat Landscape Statistics: Ransomware Activity, Vulnerability Exploits, and Attack Trends

Exposure Management

2024 Threat Landscape Statistics: Ransomware Activity, Vulnerability Exploits, and Attack Trends

Rapid7 Labs's avatar

Rapid7 Labs

New “CleverSoar” Installer Targets Chinese and Vietnamese Users

Vulnerabilities and Exploits

New “CleverSoar” Installer Targets Chinese and Vietnamese Users

Natalie Zargarov's avatar

Natalie Zargarov

A Bag of RATs: VenomRAT vs. AsyncRAT

Threat Research

A Bag of RATs: VenomRAT vs. AsyncRAT

Anna Širokova's avatar

Anna Širokova

Multiple Vulnerabilities in Wowza Streaming Engine (Fixed)

Threat Research

Multiple Vulnerabilities in Wowza Streaming Engine (Fixed)

Ryan Emmons's avatar

Ryan Emmons

LodaRAT: Established Malware, New Victim Patterns

Threat Research

LodaRAT: Established Malware, New Victim Patterns

Natalie Zargarov's avatar

Natalie Zargarov

Ransomware Groups Demystified: CyberVolk Ransomware

Detection and Response

Ransomware Groups Demystified: CyberVolk Ransomware

Rapid7 Labs's avatar

Rapid7 Labs

New Research: The Proliferation of Cellular in IoT

Threat Research

New Research: The Proliferation of Cellular in IoT

Rapid7's avatar

Rapid7

Defending Against APTs: A Learning Exercise with Kimsuky

Threat Research

Defending Against APTs: A Learning Exercise with Kimsuky

Raj Samani's avatar

Raj Samani

Rapid7 Releases the 2024 Attack Intelligence Report

Threat Research

Rapid7 Releases the 2024 Attack Intelligence Report

Rapid7's avatar

Rapid7

Stories from the SOC Part 2: MSIX Installer Utilizes Telegram Bot to Execute IDAT Loader

Detection and Response

Stories from the SOC Part 2: MSIX Installer Utilizes Telegram Bot to Execute IDAT Loader

Tom Elkins's avatar

Tom Elkins

Why The External Attack Surface Matters: An analysis into APAC related threat activities

Threat Research

Why The External Attack Surface Matters: An analysis into APAC related threat activities

Rapid7's avatar

Rapid7

The Updated APT Playbook: Tales from the Kimsuky threat actor group

Threat Research

The Updated APT Playbook: Tales from the Kimsuky threat actor group

Rapid7's avatar

Rapid7

CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)

Threat Research

CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)

Rapid7's avatar

Rapid7