The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
3641 Results

Products and Tools
Metasploit Wrap-Up 06/06/2025
Rapid7

Culture
Cultivating Growth and Development at Rapid7
Rapid7

Culture
India's Cyber Leaders Prepare for AI-Driven Threats
Rapid7

Cloud and Devops Security
Navigating AWS Migration: Achieving Clarity and Confidence
Tim Schmidt

Detection and Response
Rapid7 Q1 2025 Incident Response Findings
Chris Boyd

Threat Research
From Ideology to Financial Gain: Exploring the Convergence from Hacktivism to Cybercrime
Alexandra Blia, Yaniv Allender

Security Operations
Introducing AI Attack Coverage in Exposure Command: Secure what traditional AppSec Tools miss
Michael Chroney

Industry Trends
Key Takeaways from the Take Command Summit 2025: Risk Revolution – Proactive Strategies for Exposure Management
Rapid7

Exposure Management
Metasploit Wrap-Up 05/30/2025
Spencer McIntyre

Products and Tools
Seeing Is Securing: How Surface Command Expands MDR Visibility and Impact
Conner Goldstein

Vulnerabilities and Exploits
CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)
Anna Katarina Quinn

Industry Trends
Key Takeaways from the Take Command Summit 2025: Customer Panel on Future-Proofing VM Programs
Rapid7

Detection and Response
Retail Under Siege: What Recent Cyber Attacks Tell Us About Today’s Threat Landscape
Emma Burdett

Products and Tools
Threats don’t wait, neither should you: Mastering Emergent Threat Response Validation
Ed Montgomery

Exposure Management
Metasploit Wrap-Up
Martin Sutovsky

Industry Trends
What the Take Command 2025 Survey Tells Us About the State of Security
Rapid7

Vulnerabilities and Exploits
NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign
Anna Širokova, Ivan Feigl

Detection and Response
Key Takeaways from the Take Command Summit 2025: Inside the Mind of an Attacker
Rapid7

Products and Tools
Metasploit Wrap-Up 05/16/2025
Spencer McIntyre

Products and Tools
Ivanti Endpoint Manager Mobile exploit chain exploited in the wild
Ryan Emmons

Products and Tools
CVE-2025-32756 Exploited in the Wild, Affecting Multiple Fortinet Products
Stephen Fewer