🔗: rapid7.com
Dive into the latest research from Rapid7: r-7.co/44u48zq
Dive into the latest research from Rapid7: r-7.co/44u48zq
Assigned a CVSS score of 10.0, it facilitates unauth. RCE on versions of #OneView before 11.0. Find our hotfix analysis & more in the Rapid7 blog: r-7.co/4pE9rVs
Assigned a CVSS score of 10.0, it facilitates unauth. RCE on versions of #OneView before 11.0. Find our hotfix analysis & more in the Rapid7 blog: r-7.co/4pE9rVs
CVE-2025-59718 & CVE-2025-59719, carrying critical CVSSv3 scores, allow an unauthenticated remote attacker to gain device admin access. Read on: r-7.co/4j32ZF7
CVE-2025-59718 & CVE-2025-59719, carrying critical CVSSv3 scores, allow an unauthenticated remote attacker to gain device admin access. Read on: r-7.co/4j32ZF7
Join us Thursday December 18th 8 am PT / 11 am ET
us06web.zoom.us/webinar/regi...
Panelists explore how eroding trust drives #cyberthreats, supply chain risks, and disinformation—asking if cooperation is our strongest defense
Join us Thursday December 18th 8 am PT / 11 am ET
us06web.zoom.us/webinar/regi...
Panelists explore how eroding trust drives #cyberthreats, supply chain risks, and disinformation—asking if cooperation is our strongest defense
The infostealer is now deemed production-ready by the developers and can be expected in the wild.
Rapid7 Labs analyzed unstripped samples to detail how it operates and what defenders should know: https://r-7.co/4q5pk75
The infostealer is now deemed production-ready by the developers and can be expected in the wild.
Rapid7 Labs analyzed unstripped samples to detail how it operates and what defenders should know: https://r-7.co/4q5pk75
Rapid7 Labs analyzed unstripped samples to detail how it operates and what defenders should know: https://r-7.co/4q5pk75
Now patched, CVE-2025-10573 has been assigned a CVSS score of 9.6. More in our blog: r-7.co/4rN6TWo
Now patched, CVE-2025-10573 has been assigned a CVSS score of 9.6. More in our blog: r-7.co/4rN6TWo
CVE-2025-55182 has been assigned the maximum CVSS rating of 10.0. Find mitigation guidance and more in the Rapid7 blog: r-7.co/4rAf48q
CVE-2025-55182 has been assigned the maximum CVSS rating of 10.0. Find mitigation guidance and more in the Rapid7 blog: r-7.co/4rAf48q
At the time of publication, these vulns have not been patched. Read on: r-7.co/4a0JiuU
At the time of publication, these vulns have not been patched. Read on: r-7.co/4a0JiuU
Today, 11/14, Fortinet PSIRT published CVE-2025-64446 and an official advisory on the vulnerability. Read on: r-7.co/47VAm7r
Today, 11/14, Fortinet PSIRT published CVE-2025-64446 and an official advisory on the vulnerability. Read on: r-7.co/47VAm7r
3 critical RCEs patched, all rated less likely to be exploited. Find Rapid7's analysis in a new blog: r-7.co/4nOaIre
3 critical RCEs patched, all rated less likely to be exploited. Find Rapid7's analysis in a new blog: r-7.co/4nOaIre
Rapid7 Labs’ latest Threat Landscape Report tracks faster exploitation, new ransomware alliances, AI-assisted evasion, and state-backed campaigns reshaping the cyber domain.
🛡️ Download the report: https://r-7.co/3Lyxead
Rapid7 Labs’ latest Threat Landscape Report tracks faster exploitation, new ransomware alliances, AI-assisted evasion, and state-backed campaigns reshaping the cyber domain.
🛡️ Download the report: https://r-7.co/3Lyxead
Because calendar files (.ics) often bypass traditional email & attachment defenses, they offer attackers a low-friction path into corporate environments. More in a new blog from Rapid7 Labs: r-7.co/3Jwc9wx
Because calendar files (.ics) often bypass traditional email & attachment defenses, they offer attackers a low-friction path into corporate environments. More in a new blog from Rapid7 Labs: r-7.co/3Jwc9wx
More details available within our announcement: www.rapid7.com/blog/post/pt... #infosec
More details available within our announcement: www.rapid7.com/blog/post/pt... #infosec
Find a free download of our pubsec-focused Salt Typhoon report here: r-7.co/47tz4QT
Find a free download of our pubsec-focused Salt Typhoon report here: r-7.co/47tz4QT
This Cybersecurity Awareness Month, explore Rapid7’s collection of expert insights, case studies, and research to help you anticipate attacks and strengthen your defenses.
👉 Dive in here: https://r-7.co/3LmjwqG
This Cybersecurity Awareness Month, explore Rapid7’s collection of expert insights, case studies, and research to help you anticipate attacks and strengthen your defenses.
👉 Dive in here: https://r-7.co/3LmjwqG
Read on for Rapid7 Labs' analysis & actionable next steps: r-7.co/46VivhN
Read on for Rapid7 Labs' analysis & actionable next steps: r-7.co/46VivhN
Microsoft reports exploitation in the wild for 3 zero-days and public disclosure for another 3. Only 1 critical RCE is considered likely to be exploited.
Full analysis: https://r-7.co/4oEU4vh
Microsoft reports exploitation in the wild for 3 zero-days and public disclosure for another 3. Only 1 critical RCE is considered likely to be exploited.
Full analysis: https://r-7.co/4oEU4vh
Dive into key vendors, malware variants & more via our latest research blog: r-7.co/4hdurir
Dive into key vendors, malware variants & more via our latest research blog: r-7.co/4hdurir
Self-referred to as ‘Crimson Collective’, the group has claimed responsibility for the recent theft of private repositories from the #RedHat GitLab. More: r-7.co/48ltfqS
Self-referred to as ‘Crimson Collective’, the group has claimed responsibility for the recent theft of private repositories from the #RedHat GitLab. More: r-7.co/48ltfqS
October is Cybersecurity Awareness Month, and it's high time for orgs everywhere to 'be ready.' Read on ⤵️
October is Cybersecurity Awareness Month, and it's high time for orgs everywhere to 'be ready.' Read on ⤵️
Claims of exploitation in-the-wild at the hands of #Cl0p are supported. More in our blog: r-7.co/46VXYbM
Claims of exploitation in-the-wild at the hands of #Cl0p are supported. More in our blog: r-7.co/46VXYbM