The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Pentales: Red Team vs. N-Day (and How We Won)

Products and Tools

Pentales: Red Team vs. N-Day (and How We Won)

Ed Montgomery's avatar

Ed Montgomery

Ivanti Connect Secure CVE-2025-22457 exploited in the wild

Exposure Management

Ivanti Connect Secure CVE-2025-22457 exploited in the wild

Ryan Emmons's avatar

Ryan Emmons

Preview the Action: Two New Sessions Available Before Take Command 2025

Rapid7 Blog

Preview the Action: Two New Sessions Available Before Take Command 2025

Rapid7's avatar

Rapid7

A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware

Detection and Response

A Rebirth of a Cursed Existence? Examining ‘Babuk Locker 2.0’ Ransomware

Rapid7's avatar

Rapid7

A New Approach to Managing Vulnerabilities is Required - Work Smarter not Harder with Rapid7 Remediation Hub

Products and Tools

A New Approach to Managing Vulnerabilities is Required - Work Smarter not Harder with Rapid7 Remediation Hub

Peter Whibley's avatar

Peter Whibley

What’s New in Rapid7 Products & Services: Q1 2025 in Review

Products and Tools

What’s New in Rapid7 Products & Services: Q1 2025 in Review

Margaret Wei's avatar

Margaret Wei

Seeing is Securing: MDR VALUE at-a-glance with the Detection and Response Dashboard

Security Operations

Seeing is Securing: MDR VALUE at-a-glance with the Detection and Response Dashboard

Conner Goldstein's avatar

Conner Goldstein

Metasploit Wrap-Up 03/28/2025

Exposure Management

Metasploit Wrap-Up 03/28/2025

Jack Heysel's avatar

Jack Heysel

Overcoming the Challenges of Vulnerability Remediation

Products and Tools

Overcoming the Challenges of Vulnerability Remediation

Rapid7's avatar

Rapid7

Unpacking a post-compromise breach simulation with Vector Command

Products and Tools

Unpacking a post-compromise breach simulation with Vector Command

Ed Montgomery's avatar

Ed Montgomery

Rapid7 Earns 5-Star Rating in the 2025 CRN® Partner Program Guide

Rapid7 Blog

Rapid7 Earns 5-Star Rating in the 2025 CRN® Partner Program Guide

Rapid7's avatar

Rapid7

Inside the Mind of the Attacker: A Conversation with Raj Samani

Rapid7 Blog

Inside the Mind of the Attacker: A Conversation with Raj Samani

Rapid7's avatar

Rapid7

Multiple vulnerabilities in Ingress NGINX Controller for Kubernetes

Vulnerabilities and Exploits

Multiple vulnerabilities in Ingress NGINX Controller for Kubernetes

Stephen Fewer's avatar

Stephen Fewer

Notable vulnerabilities in Next.js (CVE-2025-29927) and CrushFTP

Exposure Management

Notable vulnerabilities in Next.js (CVE-2025-29927) and CrushFTP

Calum Hutton's avatar

Calum Hutton

Metasploit Wrap-Up 03/21/2025

Exposure Management

Metasploit Wrap-Up 03/21/2025

Simon Janusz's avatar

Simon Janusz

Secure Your Attack Surface: Key Findings from IDC's 2024 Spotlight Report

Products and Tools

Secure Your Attack Surface: Key Findings from IDC's 2024 Spotlight Report

Ed Montgomery's avatar

Ed Montgomery

Critical Veeam Backup & Replication CVE-2025-23120

Exposure Management

Critical Veeam Backup & Replication CVE-2025-23120

Rapid7's avatar

Rapid7

Apache Tomcat CVE-2025-24813: What You Need to Know

Exposure Management

Apache Tomcat CVE-2025-24813: What You Need to Know

Caitlin Condon's avatar

Caitlin Condon

Fake BianLian Ransomware Letters in Circulation

Detection and Response

Fake BianLian Ransomware Letters in Circulation

Chris Boyd's avatar

Chris Boyd

Fresh Faces Join the Take Command 2025 Lineup

Rapid7 Blog

Fresh Faces Join the Take Command 2025 Lineup

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 03/14/25

Exposure Management

Metasploit Weekly Wrap-Up 03/14/25

Jacquie Harris's avatar

Jacquie Harris