Posts tagged Threat Intel

The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report

Threat Research

The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report

Rapid7 Labs's avatar

Rapid7 Labs

Rapid7 Guidance on Observed Microsoft Teams Phishing Campaigns

Detection and Response

Rapid7 Guidance on Observed Microsoft Teams Phishing Campaigns

Brett Deroche's avatar

Brett Deroche

Rapid7 Detection Coverage for Iran-Linked Cyber Activity

Threat Research

Rapid7 Detection Coverage for Iran-Linked Cyber Activity

Rapid7 Labs's avatar

Rapid7 Labs

Iran’s Cyber Playbook in the Escalating Regional Conflict

Threat Research

Iran’s Cyber Playbook in the Escalating Regional Conflict

Rapid7 Labs's avatar

Rapid7 Labs

Chrysalis, Notepad++, and Supply Chain Risk: What it Means, and What to Do Next

Threat Research

Chrysalis, Notepad++, and Supply Chain Risk: What it Means, and What to Do Next

Rapid7's avatar

Rapid7

From Signals to Strategy: What Security Teams Must Prepare for in 2026

Industry Trends

From Signals to Strategy: What Security Teams Must Prepare for in 2026

Rapid7's avatar

Rapid7

Key Takeaways and Top Cybersecurity Predictions for 2026

Industry Trends

Key Takeaways and Top Cybersecurity Predictions for 2026

Rapid7's avatar

Rapid7

Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence

Products and Tools

Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence

Stephen Fewer's avatar

Stephen Fewer

When the Call Comes from Inside: The Rising Threat of Insider Recruitment in Ransomware Campaigns

Industry Trends

When the Call Comes from Inside: The Rising Threat of Insider Recruitment in Ransomware Campaigns

Rapid7's avatar

Rapid7

ANY.RUN and Rapid7 Threat Feed Integration

Products and Tools

ANY.RUN and Rapid7 Threat Feed Integration

Rapid7's avatar

Rapid7

From .pth to p0wned: Abuse of Pickle Files in AI Model Supply Chains

Threat Research

From .pth to p0wned: Abuse of Pickle Files in AI Model Supply Chains

Christiaan Beek's avatar

Christiaan Beek

Scattered Spider: Rapid7 Insights, Observations, and Recommendations

Threat Research

Scattered Spider: Rapid7 Insights, Observations, and Recommendations

Rapid7 Labs's avatar

Rapid7 Labs

From Ideology to Financial Gain: Exploring the Convergence from Hacktivism to Cybercrime

Threat Research

From Ideology to Financial Gain: Exploring the Convergence from Hacktivism to Cybercrime

Alexandra Blia's avatar
Yaniv Allender's avatar

Alexandra Blia, Yaniv Allender

From Noise to Action: Introducing Intelligence Hub

Threat Research

From Noise to Action: Introducing Intelligence Hub

Raj Samani's avatar
Craig Adams's avatar

Raj Samani, Craig Adams

A Bag of RATs: VenomRAT vs. AsyncRAT

Threat Research

A Bag of RATs: VenomRAT vs. AsyncRAT

Anna Širokova's avatar

Anna Širokova

LodaRAT: Established Malware, New Victim Patterns

Threat Research

LodaRAT: Established Malware, New Victim Patterns

Natalie Zargarov's avatar

Natalie Zargarov

Rapid7 Releases the 2024 Attack Intelligence Report

Threat Research

Rapid7 Releases the 2024 Attack Intelligence Report

Rapid7's avatar

Rapid7

Rapid7’s Mid-Year Threat Review

Threat Research

Rapid7’s Mid-Year Threat Review

Tom Caiazza's avatar

Tom Caiazza

The Japanese Technology and Media Attack Landscape

Threat Research

The Japanese Technology and Media Attack Landscape

Tom Caiazza's avatar

Tom Caiazza

The Japanese Threat Landscape: A Report on Cyber Threats in the Third Largest Economy on Earth

Threat Research

The Japanese Threat Landscape: A Report on Cyber Threats in the Third Largest Economy on Earth

Tom Caiazza's avatar

Tom Caiazza

3 Key Challenges to Clarity in Threat Intelligence: 2023 Forrester Consulting Total Economic Impact™ Study

Threat Research

3 Key Challenges to Clarity in Threat Intelligence: 2023 Forrester Consulting Total Economic Impact™ Study

Stacy Moran's avatar

Stacy Moran