Posts by Rapid7

Vulnerabilities and Exploits
Rapid7’s Impact from Apache Commons Text Vulnerability (CVE-2022-42889)
Rapid7

Exposure Management
Common questions when evolving your VM program
Rapid7

Exposure Management
CVE-2022-3786 and CVE-2022-3602: Two High-Severity Buffer Overflow Vulnerabilities in OpenSSL Fixed
Rapid7

Rapid7 Blog
7 Rapid Questions with Toshio Honda, Sr. Security Solutions Engineer
Rapid7

Products and Tools
Emerging best practices for securing cloud-native environments
Rapid7

Exposure Management
A SIEM With a Pen Tester's Eye: How Offensive Security Helps Shape InsightIDR
Rapid7
![[The Lost Bots] S02E04: Cyber's Most Dangerous Game — Threat Hunting](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblt82cd5c06bb93678c%2F683ddbdc3e68ee73768897fa%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.png%3Fauto%3Davif&w=1920&q=75)
Industry Trends
[The Lost Bots] S02E04: Cyber's Most Dangerous Game — Threat Hunting
Rapid7

Rapid7 Blog
5 Things Rapid7 Looks for in a BDR, and How We Spot Them
Rapid7
![[The Lost Bots] S02E03: Browser-in-Browser Attacks — Don't Get (Cat)-Phished](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblt82cd5c06bb93678c%2F683ddbdc3e68ee73768897fa%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.png%3Fauto%3Davif&w=1920&q=75)
Detection and Response
[The Lost Bots] S02E03: Browser-in-Browser Attacks — Don't Get (Cat)-Phished
Rapid7

Products and Tools
OCSF: Working Together to Standardize Data
Rapid7

Rapid7 Blog
How One Engineer Upskilled Into a Salesforce Engineering Role at Rapid7
Rapid7

Industry Trends
Building Cybersecurity KPIs for Business Leaders and Stakeholders
Rapid7
![[The Lost Bots] Season 2, Episode 2: The Worst and Best Hollywood Cybersecurity Depictions](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblt82cd5c06bb93678c%2F683ddbdc3e68ee73768897fa%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.png%3Fauto%3Davif&w=1920&q=75)
Detection and Response
[The Lost Bots] Season 2, Episode 2: The Worst and Best Hollywood Cybersecurity Depictions
Rapid7

Exposure Management
How to Build and Enable a Cyber Target Operating Model
Rapid7

Rapid7 Blog
Rapid7 Belfast Recognized for “Company Connection” During COVID-19 Pandemic
Rapid7
![[The Lost Bots] Season 2, Episode 1: SIEM Deployment in 10 Minutes](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblt82cd5c06bb93678c%2F683ddbdc3e68ee73768897fa%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.png%3Fauto%3Davif&w=1920&q=75)
Detection and Response
[The Lost Bots] Season 2, Episode 1: SIEM Deployment in 10 Minutes
Rapid7

Products and Tools
Two Rapid7 Solutions Take Top Honors at SC Awards Europe
Rapid7

Security Operations
4 Strategies to Help Your Cybersecurity Budget Work Harder
Rapid7

Threat Research
New Report Shows What Data Is Most at Risk to (and Prized by) Ransomware Attackers
Rapid7

Exposure Management
Active Exploitation of Confluence CVE-2022-26134
Rapid7

Exposure Management
CVE-2022-30190: "Follina" Microsoft Support Diagnostic Tool Vulnerability
Rapid7