Rapid7's Avatar

Rapid7

@rapid7.com

Rapid7 is a leader in AI-powered managed cybersecurity operations, trusted to advance organizations’ cyber resilience. Unified exposure and detection enable 11,500+ customers to reduce risk and disrupt attackers. πŸ”—: rapid7.com

198
Followers
18
Following
159
Posts
11.12.2024
Joined
Posts Following

Latest posts by Rapid7 @rapid7.com

Post image

The RAMP forum was a prominent hub for threat actors until early 2026, when the FBI seized its infrastructure.

The result was a splintering of groups, actors, and tactics – and now, less visibility into centralized coordination. Get the full story in a research blog from Rapid7 Labs: r-7.co/3PeOnY9

04.03.2026 13:31 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Rapid7's Global Cybersecurity Summit is back ‡️

For the first time ever, the Summit will span 2 days, with dedicated tracks designed to meet the distinct needs of security leaders and practitioners alike.

πŸ‘€ More details coming soon. Save your spot: https://r-7.co/46yJyir

03.03.2026 18:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Claude Code Security and the AI Market Reaction: What Rapid7 says Security Leaders should Focus on When Anthropic announced Claude Code Security, the market reacted immediately. The reality is more nuanced, but Claude Code Security is a legitimate signal that AI is reshaping parts of the security l...

When #Anthropic announced Claude Code Security, the market reacted immediately, a legitimate signal that AI is already reshaping parts of the security landscape.

The questions now are what parts, and what this means for the rest of the stack. More: r-7.co/4co5Irt

03.03.2026 14:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Before the Breach: When digital footprints become a strategic cyber risk Today’s threat actors are no longer limited to exploiting technical vulnerabilities; they increasingly exploit the human element and weaponize digital footprints as a primary enabler of their operatio...

Threat actors today are weaponizing digital footprints – correlating data on systems, infrastructure, and especially employees – often without generating a single security alert.

More in our blog. Find a free download of Rapid7 Labs' latest report within: r-7.co/3MtmMlm

26.02.2026 13:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127) On February 25, 2026, Cisco disclosed a critical authentication bypass vulnerability in Cisco Catalyst SD‑WAN Controller and Cisco Catalyst SD‑WAN Manager, tracked as CVE‑2026‑20127.

🚨 On 2/25/26, #Cisco disclosed a critical authentication bypass vuln. in Cisco Catalyst SD‑WAN Controller & SD‑WAN Manager – tracked as CVE‑2026‑20127.

Exposure in the wild led CISA to issue an emergency directive requiring that patches be installed by 2/27. More: r-7.co/3MvmEln

25.02.2026 22:24 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image Post image

The Jan. 2026 seizure of RAMP disrupted a major ransomware coordination hub, but it did not dismantle the ecosystem behind it. It destabilized trust and accelerated fragmentation across the underground.

Get the full story in our latest blog: r-7.co/4qW3yTy

25.02.2026 14:23 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

An executive’s online footprint can be more than a privacy issue, it’s also a business risk. πŸ‘£

Rapid7 Labs analyzed 100s of engagements from 2024-2025 to understand how exposed today’s executives really are, & what that means for the enterprise. Read on: https://r-7.co/46mH0E3

24.02.2026 14:03 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

SOC teams are flooded with signals but still lack the context to act. False positives and low-value alerts slow investigations and pull focus from real threats.

Our latest eBook outlines 4 practical shifts to move beyond alert fatigue πŸ‘‰ https://r-7.co/4aO37EH

23.02.2026 21:35 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Hacktivism and the Winter Olympics 2026: What Rapid7 is Seeing and What it Signals The 2026 Winter Olympics have been live for several weeks, and the cyber activity many predicted is already unfolding. Read on in a new Rapid7 blog.

πŸ…πŸŽΏ The '26 Winter Olympics have been live for several weeks, and threat intel has reported a surge in hacktivist chatter.

Some actors are actively targeting the defense industry, as well as orgs that might overlap with Olympic infrastructure & supply chains. More in a new blog: r-7.co/4kRFCzm

20.02.2026 16:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329) - Help Net Security CVE-2026-2329 is present in Grandstream VoIP phones' web-based API service, and is accessible in a default configuration.

Bug in widely used VoIP phones allows stealthy network footholds, call interception (CVE-2026-2329)

πŸ“– Read more: www.helpnetsecurity.com/2026/02/19/g...

#cybersecurity #cybersecuritynews #securityupdate #vulnerability #VoIP #SMBs @rapid7.com @stephenfewer.bsky.social @fulmetalpackets.bsky.social

19.02.2026 12:39 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

We have disclosed CVE-2026-2329, a critical unauth stack-based buffer overflow vuln affecting the Grandstream GXP1600 series of VoIP phones. Read our disclosure on the @rapid7.com blog, including technical details for unauth RCE, and accompanying @metasploit-r7.bsky.social modules: r-7.co/4tIzope

18.02.2026 14:39 πŸ‘ 3 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Post image

🚨 In conducting 0 day research against #Grandstream GXP1600 VoIP phones, Rapid7 Labs discovered CVE-2026-2329.

The unauthenticated stack-based buffer overflow vulnerability ultimately allows an attacker to intercept phone calls and eavesdrop on audio. Read on: r-7.co/4tIzope

18.02.2026 14:15 πŸ‘ 1 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image Post image Post image Post image

What happens when stolen credit card data is sold like a service? πŸ’³

Dump shops have evolved into carding-as-a-service (CaaS) marketplaces bundling stolen card data, tools, and support.

A new blog explores how these illegal marketplaces operate: https://r-7.co/463WvAF

12.02.2026 14:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

For February’s #PatchTuesday, Microsoft published 55 vulnerabilities.

6 are already being exploited in the wild, and 3 were publicly disclosed before patches were released. Here's what to know before you patch: https://r-7.co/4rcV1fX

11.02.2026 21:13 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Measuring AI Security: What MCP Exposure Really Shows Real-world research into AI security risk using Model Context Protocol servers, separating measurable exposure from fear-driven narratives.

Each week, headlines warn of AI-driven jailbreaks, agents gone rogue, and LLM-enabled cybercrime – raising important questions, but rarely answering the most basic one:

What does the attack surface of today's AI systems actually look like? Rapid7's Christiaan Beek ran the numbers: r-7.co/4r9aq0B

10.02.2026 18:13 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2026-1731: Critical Unauthenticated Remote Code Execution in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) Rapid7 Website

🚨 On 2/6/26, #BeyondTrust disclosed a critical RCE vulnerability affecting its Remote Support (RS) and Privileged Remote Access (PRA) products.

The flaw has been assigned CVE-2026-1731 and a near-maximum CVSSv4 score of 9.9.

More in the Rapid7 blog: r-7.co/4arAjln

09.02.2026 18:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Your Friday reading sorted: Rapid7's findings around the 'Chrysalis' backdoor & Notepad++ compromise made their media rounds this week.

Dive into some of the top pieces below:
πŸ—žοΈ Reuters: r-7.co/4qhvpNH
πŸ—žοΈ TechCrunch: r-7.co/4tcjuTQ
πŸ—žοΈ BleepingComputer: r-7.co/4kkDEHp
πŸ—žοΈ The Hacker News: r-7.co/4cfkgJD

06.02.2026 16:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Chrysalis, Notepad++, and Supply Chain Risk: What it Means, and What to Do Next When Rapid7 published its analysis of the Chrysalis backdoor linked to a compromise of Notepad++ update infrastructure, it raised understandable questions from customers and security teams. Find answe...

After publishing our analysis of the Chrysalis backdoor (and Notepad++ compromise), customers & security teams had questions.

πŸ‘‰ Find an FAQ rundown in our latest blog, plus a link to Christiaan Beek's "Inside Chrysalis" session, now available on demand: r-7.co/3MrkJxZ

05.02.2026 15:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Rapid7 thanks @AiexGP (on X) for contributing the IoCs we've shared in our blog.

02.02.2026 19:59 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom.

πŸ”Ž Rapid7 Labs, alongside our MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group #LotusBlossom.

Find a deep technical analysis of the custom backdoor 'Chrysalis', Notepad++, Warbird, and more in our latest blog: r-7.co/4kaerPA

02.02.2026 18:17 πŸ‘ 4 πŸ” 2 πŸ’¬ 1 πŸ“Œ 1
Preview
Critical Ivanti Endpoint Manager Mobile (EPMM) zero-day exploited in the wild (CVE-2026-1281 & CVE-2026-1340) On January 29, 2026, Ivanti disclosed two new critical vulnerabilities affecting Endpoint Manager Mobile (EPMM): CVE-2026-1281 and CVE-2026-1340. The vendor has indicated that exploitation in the wild...

🚨 On 1/29/26, #Ivanti disclosed 2 new critical vulnerabilities affecting Endpoint Manager Mobile (EPMM): CVE-2026-1281 & CVE-2026-1340.

The vendor has indicated that exploitation in the wild has already occurred prior to disclosure. More in our blog: r-7.co/4qZBsaH

30.01.2026 16:24 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

Which #Microsoft vulnerabilities were of the most value to attackers in 2025? Turns out, the more things change, the more they stay the same.

Tech debt, backwards compatibility, elevations of privilege, and a dash of AI – this blog's got it all. Dive in: r-7.co/4qaqduX

28.01.2026 18:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Multiple Critical SolarWinds Web Help Desk Vulnerabilities: CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554 SolarWinds has published an advisory for multiple new vulnerabilities affecting their Web Help Desk product. Stay up to date with a new Rapid7 blog.

🚨 On 1/28/26, #SolarWinds published an advisory for multiple new vulns affecting their Web Help Desk product.

Of the 6 new CVEs, 4 are critical, and allow a remote attacker to either achieve unauthenticated RCE or bypass authentication. Read on: r-7.co/4rgPjsR

28.01.2026 15:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
From Signals to Strategy: What Security Teams Must Prepare for in 2026 Geopolitics, insider risk, and threat intelligence have long influenced cyber operations; what has changed is the extent to which they directly affect everyday security decisions. More distillations f...

🌐 Geopolitics, insider risk, and threat intel have long influenced our world's cyber operations. What's changing is how they're now affecting everyday, company-level security decisions.

Read on and find a link to Rapid7's year-end session on demand here: r-7.co/4b9aQz3

22.01.2026 15:49 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸ†• Rapid7 MDR now delivers preemptive detection, investigation, & response for Microsoft environments.

Defender signals are integrated into Rapid7 MDR, where they are monitored and investigated by our SOC with exposure and asset risk context. Learn more: https://r-7.co/4a5emcw

21.01.2026 14:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Ni8mare and N8scape flaws among multiple critical vulnerabilities affecting n8n On November 18, 2025, a patched release was published for a critical unauthenticated file read vulnerability in n8n, a popular piece of automation software. Read more in the Rapid7 blog.

🚨 In November 2025, a critical vuln. was patched in #n8n, a popular piece of automation software.

The advisory for (what the finders have dubbed) #Ni8mare was published on January 7, 2026 – now tracked as CVE-2026-21858 with a CVSS score of 10.0.

More: r-7.co/3Z3aGBP

08.01.2026 21:31 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

New year, same mission: helping teams take command of the attack surface. πŸ’₯

Wishing you a secure New Year from Rapid7!

01.01.2026 16:19 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image Post image

Here are the top 3 predictions Rapid7 experts are seeing for 2026 πŸ‘‡

Now available on demand, Rapid7’s cybersecurity predictions webinar breaks down what those shifts could mean for security teams in the year ahead: https://r-7.co/4j48Wlf

30.12.2025 18:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
MongoBleed CVE-2025-1484: Critical Memory Leak in MongoDB Allowing Attackers to Extract Sensitive Data On December 19, 2025, MongoDB Inc. disclosed a critical new vulnerability, CVE-2025-14847, which has since been dubbed MongoBleed. This vulnerability is a high-severity unauthenticated memory leak aff...

🚨 On 12/19/25, MongoDB Inc. disclosed a critical new vuln. affecting #MongoDB – one of the most popular document-oriented databases.

CVE-2025-14847, or #MongoBleed, is a high-severity unauthenticated memory leak. More in the Rapid7 blog: r-7.co/4piWbER

29.12.2025 14:27 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸ–¨οΈ Advancements in #MFP devices allow them to be conveniently integrated throughout enterprise environments. But they're often left overlooked & underprotected – breeding far-reaching security implications.

Dive into the latest research from Rapid7: r-7.co/44u48zq

23.12.2025 14:11 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0