The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Unlocking MSSP Success: Why CTEM is Critical

Products and Tools

Unlocking MSSP Success: Why CTEM is Critical

Rapid7's avatar

Rapid7

Explaining External Network Assessment with Vector Command

Products and Tools

Explaining External Network Assessment with Vector Command

Ed Montgomery's avatar

Ed Montgomery

Patch Tuesday - March 2025

Detection and Response

Patch Tuesday - March 2025

Adam Barnett's avatar

Adam Barnett

Helping us help you: Practical applications of AI in the SOC

Products and Tools

Helping us help you: Practical applications of AI in the SOC

Conner Goldstein's avatar

Conner Goldstein

Seeing The Whole Picture: A Better Way To Manage Your Attack Surface

Products and Tools

Seeing The Whole Picture: A Better Way To Manage Your Attack Surface

Michael Chroney's avatar

Michael Chroney

Metasploit Wrap-Up 03/06/2025

Exposure Management

Metasploit Wrap-Up 03/06/2025

Brendan Watters's avatar

Brendan Watters

Inside the Take Command Summit 2025 Agenda: What’s in Store for This Year’s Event?

Rapid7 Blog

Inside the Take Command Summit 2025 Agenda: What’s in Store for This Year’s Event?

Rapid7's avatar

Rapid7

Multiple Zero-Day Vulnerabilities in Broadcom VMware ESXi and Other Products

Exposure Management

Multiple Zero-Day Vulnerabilities in Broadcom VMware ESXi and Other Products

Stephen Fewer's avatar

Stephen Fewer

Building a High Performance Team in India: Meet Swami Nathan

Rapid7 Blog

Building a High Performance Team in India: Meet Swami Nathan

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up: 02/28/2025

Exposure Management

Metasploit Weekly Wrap-Up: 02/28/2025

Jacquie Harris's avatar

Jacquie Harris

Why MDR In 2025 Is About Scaling With Purpose

Threat Research

Why MDR In 2025 Is About Scaling With Purpose

Craig Adams's avatar

Craig Adams

MDR + SIEM: Why Full Access to Your Security Logs is Non-Negotiable

Detection and Response

MDR + SIEM: Why Full Access to Your Security Logs is Non-Negotiable

René Fusco's avatar

René Fusco

Uncovering and Protecting Sensitive Data Across Cloud Environments with Exposure Command

Products and Tools

Uncovering and Protecting Sensitive Data Across Cloud Environments with Exposure Command

Rapid7's avatar

Rapid7

Command Platform Innovations Eliminate Data Blind Spots Through Complete Visibility and Context-Driven Risk Prioritization

Products and Tools

Command Platform Innovations Eliminate Data Blind Spots Through Complete Visibility and Context-Driven Risk Prioritization

Rapid7's avatar

Rapid7

Under The Hoodie: The Pen Test Diaries

Exposure Management

Under The Hoodie: The Pen Test Diaries

Emma Burdett's avatar

Emma Burdett

Metasploit Weekly Wrap-Up 02/21/2025

Exposure Management

Metasploit Weekly Wrap-Up 02/21/2025

Diego Ledda's avatar

Diego Ledda

Take Command | Rapid7’s 2025 Cybersecurity Summit: First Look at Our Speaker Lineup

Rapid7 Blog

Take Command | Rapid7’s 2025 Cybersecurity Summit: First Look at Our Speaker Lineup

Rapid7's avatar

Rapid7

Rapid7 Fills Gaps in the CVE Assessment Process with AI-Generated Vulnerability Scoring in Exposure Command

Security Operations

Rapid7 Fills Gaps in the CVE Assessment Process with AI-Generated Vulnerability Scoring in Exposure Command

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 02/14/2025

Exposure Management

Metasploit Weekly Wrap-Up 02/14/2025

Christopher Granleese's avatar

Christopher Granleese

Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vulnerabilities (FIXED)

Vulnerabilities and Exploits

Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vulnerabilities (FIXED)

Deral Heiland's avatar

Deral Heiland

CVE-2025-1094: PostgreSQL psql SQL injection (FIXED)

Threat Research

CVE-2025-1094: PostgreSQL psql SQL injection (FIXED)

Stephen Fewer's avatar

Stephen Fewer