Stealthy BPFDoor Variants are a Needle That Looks Like Hay
⠀ The video ends showing that the backdoor exits after 12s of attacker inactivity, killing the connection. The tcpdump capture shows attacker traffic being sent…
⠀ The video ends showing that the backdoor exits after 12s of attacker inactivity, killing the connection. The tcpdump capture shows attacker traffic being sent…
For years, cybersecurity professionals have relied on a familiar metric to dictate their day-to-day priorities: the Common Vulnerability Scoring System (CVSS). In today’s hyper-connected, sprawling…
If it’s online, it’s a target Web applications are no longer just business enablers, they’re often the front door to an organization. They can often…
Earlier this year, we made a significant announcement: Rapid7 partnered with ARMO to add AI-powered cloud application detection and response (CADR) – or cloud runtime…
The tension arising out of the conflict in Iran is beginning to show signs of expanding beyond a strictly regional crisis. Following our recent published…
What is purple teaming? Purple teaming is often described as the collaboration between red teams and blue teams. That definition is accurate, but incomplete. At…
Overview Rapid7 Labs conducted a zero-day research project against the Grandstream GXP1600 series of Voice over Internet Protocol (VoIP) phones. This research resulted in the…
Executive summary The January 2026 seizure of RAMP disrupted a major ransomware coordination hub, but it did not dismantle the ecosystem behind it. Instead, it…
Hospitals invest heavily in physical security: Clinical areas are access-controlled, sensitive rooms are locked, and patient records are governed by strict handling procedures. Network exposure…
Regardless of where you’re at in your application security maturity, dynamic application security testing (DAST) is a program staple in a few key ways: It…
Encoder exposed! Some of our releases add new ways in; this one adds new ways to stay in. There are, of course, still new…