Raj Samani

Chief Scientist at Rapid7 (ex McAfee) | Cloud Security Alliance - Chief Innovation Officer | Co-author of Smart Grid Cyber Book & CSA Guide to Cloud | Advisor Europol European Cybercrime Centre (EC3)

2024-01-22

Our latest @rapid7 analysis details Critical CVEs in Outdated Versions of Atlassian Confluence and VMware vCenter Server rapid7.com/blog/post/2024/01/1

2024-01-15

Our latest Rapid7 Labs publication details an assessment of the hashtag#ransomware landscape detailing the most common threat groups and the common patterns and methodologies observed in the majority of ransomware attacks.: rapid7.com/blog/post/2024/01/1 #infosec #cybersecurity H/T @ChristiaanB

2023-12-22

We are hiring! Great opportunity to join the vulnerability and exploit research team. More details here: careers.rapid7.com/jobs/lead-s #infosec #infosecjobs

2023-12-13

@theomegabit nice to meet you. We have a lot of the team here who are posting and also @metasploit posts much of our content.

2023-11-10

Our latest @rapid7analysis details CVE-2023-47426, a zero-day path traversal vulnerability affecting on-premise SysAid servers. Including IoCs and @velocidex
artifact: rapid7.com/blog/post/2023/11/0 #infosec

2023-10-18

Our latest @rapid7 advisory details CVE-2023-20198: Active Exploitation of Cisco IOS XE Zero-Day Vulnerability - IoCs and observed attacker behaviour included; rapid7.com/blog/post/2023/10/1

2023-10-03

We have now posted our @rapid7 analysis into CVE-2023-40044, a .NET deserialization vulnerability affecting the Ad Hoc Transfer module of WS_FTP Server. Now available on @AttackerKb attackerkb.com/topics/bn32f9sN

2023-10-02

We are seeing multiple instances of WS_FTP exploitation in the wild. Further details of this and the vulnerabilities in the advisory, two of which are critical (CVE-2023-40044 and CVE-2023-42657) available in our
Rapid7 advisory: rapid7.com/blog/post/2023/09/2

2023-09-26

Our latest @rapid7 advisory details CVE-2023-42793: Critical Authentication Bypass in JetBrains TeamCity CI/CD Servers. More details here rapid7.com/blog/post/2023/09/2

2023-09-06

Our latest @rapid7 analysis details a new loader to execute infostealers on compromised systems including StealC and Lumma. More details including IoCs available here rapid7.com/blog/post/2023/08/3 #infosec #malware

2023-08-29

Our latest Rapid7 analysis details observed Exploitation of Cisco ASA SSL VPNs, further details including IoCs located here: rapid7.com/blog/post/2023/08/2

2023-08-28

Our @metasploit weekly wrap up details two new exploit modules leveraging CVE-2023-34960 Chamilo versions 1.11.18 and below and CVE-2023-26469 in Jorani 1.0.0 - more details here: rapid7.com/blog/post/2023/08/2 #infosec

2023-08-04

Our latest research analyses a dozen medical infusion pumps available for purchase on the secondary market, and how these were not properly decommissioned before being sold: rapid7.com/blog/post/2023/08/0 #infosec

2023-08-03

Our latest analysis details CVE-2023-35082, a new vulnerability that allows unauthenticated attackers to access the API in older unsupported versions of MobileIron Core (11.2 and below). rapid7.com/blog/post/2023/08/0 #infosec #cybersecurity

2023-06-20

ICYMI We recently released @velocidex Artifact that "enables scoping EventLogs from Progress Software’s MoveIT File Transfer. It is designed to assist in identifying exfiltration resulting from the exploitation of CVE-2023-34362" docs.velociraptor.app/exchange

2023-06-09

Further details on CVE-2023-2868: Total Compromise of Physical Barracuda ESG Appliances - note we have identified malicious activity that took place as far back as November 2022: rapid7.com/blog/post/2023/06/0 #cybersecurity #înfosec

2023-06-05

New Velociraptor artifact now available that "enables scoping EventLogs from Progress Software’s MoveIT File Transfer. It is designed to assist in identifying exfiltration resulting from the exploitation of CVE-2023-34362" docs.velociraptor.app/exchange #DFIR #Infosec #cybersecurity

2023-06-01

We are hiring! We are looking for a Senior Manager driving communications within our @rapid7 Labs team.
More details here: careers.rapid7.com/jobs/senior #infosecjobs #infosec

2023-05-30

Technical analysis detailing CVE-2023-25690 in Apache HTTP Server 2.4.56 now available in AttackerKb - Its CVSS base score is 9.8, as this can theoretically bypass access controls attackerkb.com/topics/0Uka1VHs

2023-05-01

We are hiring! Great opportunity to join the @rapid7 Labs team as a software engineer - more details here: careers.rapid7.com/jobs/softwa #infosecjobs

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst