The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

20/20 Cybersecurity: Lessons Learned in 2024 and Strategies for a Stronger 2025

Security Operations

20/20 Cybersecurity: Lessons Learned in 2024 and Strategies for a Stronger 2025

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 11/01/2024

Exposure Management

Metasploit Weekly Wrap-Up 11/01/2024

Alan David Foster's avatar

Alan David Foster

Finding the LNK: Techniques and methodology for advanced analysis with Velociraptor

Products and Tools

Finding the LNK: Techniques and methodology for advanced analysis with Velociraptor

Matthew Green's avatar

Matthew Green

Investigating a SharePoint Compromise: IR Tales from the Field

Detection and Response

Investigating a SharePoint Compromise: IR Tales from the Field

Rapid7's avatar

Rapid7

The Importance of Asset Context in Attack Surface Management.

Products and Tools

The Importance of Asset Context in Attack Surface Management.

Jon Schipp's avatar

Jon Schipp

Metasploit Weekly Wrap-Up 10/25/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/25/2024

Brendan Watters's avatar

Brendan Watters

Building a Custom Risk Prioritization and Risk Scoring Methodology with Surface Command

Products and Tools

Building a Custom Risk Prioritization and Risk Scoring Methodology with Surface Command

Chaney Edwards's avatar

Chaney Edwards

Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks

Exposure Management

Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks

Caitlin Condon's avatar

Caitlin Condon

Metasploit Weekly Wrap-Up 10/18/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/18/2024

Spencer McIntyre's avatar

Spencer McIntyre

7 Rapid Questions on our Belfast Placement Programme: Orla Magee and Paddy McDermott

Rapid7 Blog

7 Rapid Questions on our Belfast Placement Programme: Orla Magee and Paddy McDermott

Rapid7's avatar

Rapid7

Understanding your Attack Surface: Different Approaches to Asset Discovery

Rapid7 Blog

Understanding your Attack Surface: Different Approaches to Asset Discovery

Jon Schipp's avatar

Jon Schipp

Root Access for Data Control: A DEF CON IoT Village Story

Detection and Response

Root Access for Data Control: A DEF CON IoT Village Story

Rapid7's avatar

Rapid7

Test Driving a New Benefit Programme in Belfast

Rapid7 Blog

Test Driving a New Benefit Programme in Belfast

Rapid7's avatar

Rapid7

Patch Tuesday - October 2024

Detection and Response

Patch Tuesday - October 2024

Adam Barnett's avatar

Adam Barnett

Metasploit Weekly Wrap-Up 10/04/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/04/2024

Jacquie Harris's avatar

Jacquie Harris

The Main Components of an Attack Surface Management (ASM) Strategy

Rapid7 Blog

The Main Components of an Attack Surface Management (ASM) Strategy

Jon Schipp's avatar

Jon Schipp

Ransomware Groups Demystified: CyberVolk Ransomware

Detection and Response

Ransomware Groups Demystified: CyberVolk Ransomware

Rapid7 Labs's avatar

Rapid7 Labs

Modernizing Your VM Program with Rapid7 Exposure Command: A Path to Effective Continuous Threat Exposure Management

Products and Tools

Modernizing Your VM Program with Rapid7 Exposure Command: A Path to Effective Continuous Threat Exposure Management

Ryan Blanchard's avatar

Ryan Blanchard

What’s New in Rapid7 Products & Services: Q3 2024 in Review

Products and Tools

What’s New in Rapid7 Products & Services: Q3 2024 in Review

Margaret Wei's avatar

Margaret Wei

Proactive Visibility Is Foundational to Strong Cybersecurity

Rapid7 Blog

Proactive Visibility Is Foundational to Strong Cybersecurity

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 09/27/2024

Exposure Management

Metasploit Weekly Wrap-Up 09/27/2024

Christophe De La Fuente's avatar

Christophe De La Fuente