Summary is AI-generated, newsdesk-reviewed
  • Rapid7 report reveals AI-weaponized ransomware evolving as structured corporate-like threat actors.
  • Newly exploited vulnerabilities drop, older unpatched CVEs remain potent dangers for organizations.
  • Generative AI boosts phishing capabilities, ransomware activity rises with 88 active groups.

Rapid7 has unveiled its Q3 2025 Threat Landscape Report, highlighting the evolving tactics of threat actors in exploiting vulnerabilities, enhancing ransomware operations, and utilizing artificial intelligence to evade detection. The report bases its findings on data from Rapid7’s Intelligence Hub, AttackerKB, incident response, and managed detection and response (MDR) telemetry, providing a comprehensive view of the shifting threat landscape.

Chief Scientist Raj Samani emphasized the strategic shift in ransomware, stating, "Ransomware has evolved significantly beyond its early days to become a calculated strategy that destabilizes industries."

Samani noted that ransomware groups now function like shadow corporations, integrating infrastructure, tactics, and public relations to rapidly undermine trust.

Critical Vulnerability Exploitation

Despite this decline, attackers continue to target older, unpatched vulnerabilities

The report indicates a 21% reduction in newly exploited vulnerabilities from the second quarter to the third in 2025. Despite this decline, attackers continue to target older, unpatched vulnerabilities, including those over ten years old, highlighting their ongoing threat.

High-profile examples include vulnerabilities in Microsoft SharePoint (CVE-2025-53770) and Cisco ASA/FTD products, emphasizing the narrowing timeframe between the disclosure of a patch and exploitation in real-world attacks.

Christiaan Beek, Rapid7's Senior Director of Threat Intelligence and Analytics, noted the urgency of this issue: "The moment a vulnerability is disclosed, it becomes a bullet in the attacker’s arsenal. Attackers are no longer waiting. Instead, they’re weaponizing vulnerabilities in real time and turning every disclosure into an opportunity for exploitation."

Ransomware Activity Increases

The quarter experienced a rise in ransomware activity, with 88 active groups compared to 65 in Q2 and 76 in Q1, illustrating not only a surge in activity but also the fluid adaptability of these groups. Notable groups, such as Qilin, SafePay, and WorldLeaks have formed alliances targeting sectors like business services, manufacturing, and healthcare.

They are currently experimenting with innovative tactics, including fileless operations and single-extortion data leaks, as well as affiliate service offerings such as ransom negotiation assistance.

Generative AI Advancements

The report addresses how generative artificial intelligence is simplifying the creation of sophisticated phishing campaigns and supporting adaptive malware like LAMEHUG, which can produce new commands as needed. Additionally, nation-state actors from Russia, China, and Iran are refining their strategies, blurring lines between espionage and disruption by focusing on supply chains and identity systems with an emphasis on stealth and persistence.

The findings underscore the need for organizations to remain vigilant and proactive in their cybersecurity measures, adapting to the increasingly sophisticated threats posed by both human and machine-driven adversaries.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...