Summary is AI-generated, newsdesk-reviewed
  • Rapid7 Q3 report: Ransomware groups rise, generative AI boosts phishing and adaptive malware.
  • Exploitation of historical vulnerabilities persists; organisations urged to react rapidly to disclosure.
  • Nation-state operators from Russia, China, and Iran blur espionage with disruption tactics.

Rapid7 has published its Q3 2025 Threat Landscape Report, shedding light on trends in ransomware and artificial intelligence in the realm of cyber threats. The report highlights how malicious actors are enhancing their operations by weaponising AI and consolidating ransomware efforts, while exploiting vulnerabilities both new and longstanding.

This intelligence is built on data from Rapid7’s Intelligence Hub, AttackerKB, incident response activities, and managed detection and response (MDR) telemetry, providing a comprehensive view of adversary behaviours and defensive strategies.

Critical vulnerability exploitation

Rapid7 found a 21% decrease in newly exploited vulnerabilities from the second to the third quarter

In its recent quarterly review, Rapid7 found a 21% decrease in newly exploited vulnerabilities from the second to the third quarter. Despite the reduction, attackers are increasingly targeting older, unpatched vulnerabilities, some over a decade old.

Notably, critical vulnerabilities, such as those found in Microsoft SharePoint (CVE-2025-53770) and Cisco ASA/FTD products are being exploited as soon as patches are disclosed, emphasising the importance of timely patch management.

Christiaan Beek, Senior Director of Threat Intelligence and Analytics at Rapid7, noted, "The moment a vulnerability is disclosed, it becomes a bullet in the attacker’s arsenal, necessitating fast action from organisations."

Ransomware activity spikes

The report recorded an increase in active ransomware groups, with 88 groups operating in Q3 compared to 65 in Q2 and 76 in Q1. This rise underscores the dynamic nature of these groups. Notably, Qilin, SafePay, and WorldLeaks have been at the forefront, forming alliances that target various sectors including business services, manufacturing, and healthcare.

These groups are innovating through fileless attacks, single-extortion data leaks, and offering affiliate services, such as ransom negotiation training, demonstrating a strategic shift towards more sophisticated operations.

Generative AI in threats

Generative AI is identified as a tool lowering barriers for launching phishing campaigns and developing adaptive malware. LAMEHUG, an example of such malware, adapts by generating new commands dynamically.

Additionally, state-sponsored actors from countries, such as Russia, China, and Iran are refining their techniques to blur the lines between espionage and disruption. They are increasingly targeting supply chains and identity systems with strategies emphasising stealth and persistence.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...