Summary is AI-generated, newsdesk-reviewed
  • Rapid7 report reveals AI-weaponized ransomware evolving as structured corporate-like threat actors.
  • Newly exploited vulnerabilities drop, older unpatched CVEs remain potent dangers for organizations.
  • Generative AI boosts phishing capabilities, ransomware activity rises with 88 active groups.

Rapid7 has unveiled its Q3 2025 Threat Landscape Report, highlighting the evolving tactics of threat actors in exploiting vulnerabilities, enhancing ransomware operations, and utilizing artificial intelligence to evade detection. The report bases its findings on data from Rapid7’s Intelligence Hub, AttackerKB, incident response, and managed detection and response (MDR) telemetry, providing a comprehensive view of the shifting threat landscape.

Chief Scientist Raj Samani emphasized the strategic shift in ransomware, stating, "Ransomware has evolved significantly beyond its early days to become a calculated strategy that destabilizes industries."

Samani noted that ransomware groups now function like shadow corporations, integrating infrastructure, tactics, and public relations to rapidly undermine trust.

Critical Vulnerability Exploitation

Despite this decline, attackers continue to target older, unpatched vulnerabilities

The report indicates a 21% reduction in newly exploited vulnerabilities from the second quarter to the third in 2025. Despite this decline, attackers continue to target older, unpatched vulnerabilities, including those over ten years old, highlighting their ongoing threat.

High-profile examples include vulnerabilities in Microsoft SharePoint (CVE-2025-53770) and Cisco ASA/FTD products, emphasizing the narrowing timeframe between the disclosure of a patch and exploitation in real-world attacks.

Christiaan Beek, Rapid7's Senior Director of Threat Intelligence and Analytics, noted the urgency of this issue: "The moment a vulnerability is disclosed, it becomes a bullet in the attacker’s arsenal. Attackers are no longer waiting. Instead, they’re weaponizing vulnerabilities in real time and turning every disclosure into an opportunity for exploitation."

Ransomware Activity Increases

The quarter experienced a rise in ransomware activity, with 88 active groups compared to 65 in Q2 and 76 in Q1, illustrating not only a surge in activity but also the fluid adaptability of these groups. Notable groups, such as Qilin, SafePay, and WorldLeaks have formed alliances targeting sectors like business services, manufacturing, and healthcare.

They are currently experimenting with innovative tactics, including fileless operations and single-extortion data leaks, as well as affiliate service offerings such as ransom negotiation assistance.

Generative AI Advancements

The report addresses how generative artificial intelligence is simplifying the creation of sophisticated phishing campaigns and supporting adaptive malware like LAMEHUG, which can produce new commands as needed. Additionally, nation-state actors from Russia, China, and Iran are refining their strategies, blurring lines between espionage and disruption by focusing on supply chains and identity systems with an emphasis on stealth and persistence.

The findings underscore the need for organizations to remain vigilant and proactive in their cybersecurity measures, adapting to the increasingly sophisticated threats posed by both human and machine-driven adversaries.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...