The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

LodaRAT: Established Malware, New Victim Patterns

Threat Research

LodaRAT: Established Malware, New Victim Patterns

Natalie Zargarov's avatar

Natalie Zargarov

Metasploit Wrap-Up: 11/08/2024

Exposure Management

Metasploit Wrap-Up: 11/08/2024

Simon Janusz's avatar

Simon Janusz

Mind the Gap: How Surface Command Tackles Asset Visibility in Attack Surface Management

Rapid7 Blog

Mind the Gap: How Surface Command Tackles Asset Visibility in Attack Surface Management

Ed Montgomery's avatar

Ed Montgomery

Cathal O’Neill - Taking Command of Your Career in Tech

Rapid7 Blog

Cathal O’Neill - Taking Command of Your Career in Tech

Rapid7's avatar

Rapid7

20/20 Cybersecurity: Lessons Learned in 2024 and Strategies for a Stronger 2025

Security Operations

20/20 Cybersecurity: Lessons Learned in 2024 and Strategies for a Stronger 2025

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 11/01/2024

Exposure Management

Metasploit Weekly Wrap-Up 11/01/2024

Alan David Foster's avatar

Alan David Foster

Finding the LNK: Techniques and methodology for advanced analysis with Velociraptor

Products and Tools

Finding the LNK: Techniques and methodology for advanced analysis with Velociraptor

Matthew Green's avatar

Matthew Green

Investigating a SharePoint Compromise: IR Tales from the Field

Detection and Response

Investigating a SharePoint Compromise: IR Tales from the Field

Rapid7's avatar

Rapid7

The Importance of Asset Context in Attack Surface Management.

Products and Tools

The Importance of Asset Context in Attack Surface Management.

Jon Schipp's avatar

Jon Schipp

Metasploit Weekly Wrap-Up 10/25/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/25/2024

Brendan Watters's avatar

Brendan Watters

Building a Custom Risk Prioritization and Risk Scoring Methodology with Surface Command

Products and Tools

Building a Custom Risk Prioritization and Risk Scoring Methodology with Surface Command

Chaney Edwards's avatar

Chaney Edwards

Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks

Exposure Management

Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks

Caitlin Condon's avatar

Caitlin Condon

Metasploit Weekly Wrap-Up 10/18/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/18/2024

Spencer McIntyre's avatar

Spencer McIntyre

7 Rapid Questions on our Belfast Placement Programme: Orla Magee and Paddy McDermott

Rapid7 Blog

7 Rapid Questions on our Belfast Placement Programme: Orla Magee and Paddy McDermott

Rapid7's avatar

Rapid7

Understanding your Attack Surface: Different Approaches to Asset Discovery

Rapid7 Blog

Understanding your Attack Surface: Different Approaches to Asset Discovery

Jon Schipp's avatar

Jon Schipp

Root Access for Data Control: A DEF CON IoT Village Story

Detection and Response

Root Access for Data Control: A DEF CON IoT Village Story

Rapid7's avatar

Rapid7

Test Driving a New Benefit Programme in Belfast

Rapid7 Blog

Test Driving a New Benefit Programme in Belfast

Rapid7's avatar

Rapid7

Patch Tuesday - October 2024

Detection and Response

Patch Tuesday - October 2024

Adam Barnett's avatar

Adam Barnett

Metasploit Weekly Wrap-Up 10/04/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/04/2024

Jacquie Harris's avatar

Jacquie Harris

The Main Components of an Attack Surface Management (ASM) Strategy

Rapid7 Blog

The Main Components of an Attack Surface Management (ASM) Strategy

Jon Schipp's avatar

Jon Schipp

Ransomware Groups Demystified: CyberVolk Ransomware

Detection and Response

Ransomware Groups Demystified: CyberVolk Ransomware

Rapid7 Labs's avatar

Rapid7 Labs