The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Investigating a SharePoint Compromise: IR Tales from the Field

Detection and Response

Investigating a SharePoint Compromise: IR Tales from the Field

Rapid7's avatar

Rapid7

The Importance of Asset Context in Attack Surface Management.

Products and Tools

The Importance of Asset Context in Attack Surface Management.

Jon Schipp's avatar

Jon Schipp

Metasploit Weekly Wrap-Up 10/25/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/25/2024

Brendan Watters's avatar

Brendan Watters

Building a Custom Risk Prioritization and Risk Scoring Methodology with Surface Command

Products and Tools

Building a Custom Risk Prioritization and Risk Scoring Methodology with Surface Command

Chaney Edwards's avatar

Chaney Edwards

Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks

Exposure Management

Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks

Caitlin Condon's avatar

Caitlin Condon

Metasploit Weekly Wrap-Up 10/18/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/18/2024

Spencer McIntyre's avatar

Spencer McIntyre

7 Rapid Questions on our Belfast Placement Programme: Orla Magee and Paddy McDermott

Rapid7 Blog

7 Rapid Questions on our Belfast Placement Programme: Orla Magee and Paddy McDermott

Rapid7's avatar

Rapid7

Understanding your Attack Surface: Different Approaches to Asset Discovery

Rapid7 Blog

Understanding your Attack Surface: Different Approaches to Asset Discovery

Jon Schipp's avatar

Jon Schipp

Root Access for Data Control: A DEF CON IoT Village Story

Detection and Response

Root Access for Data Control: A DEF CON IoT Village Story

Rapid7's avatar

Rapid7

Test Driving a New Benefit Programme in Belfast

Rapid7 Blog

Test Driving a New Benefit Programme in Belfast

Rapid7's avatar

Rapid7

Patch Tuesday - October 2024

Detection and Response

Patch Tuesday - October 2024

Adam Barnett's avatar

Adam Barnett

Metasploit Weekly Wrap-Up 10/04/2024

Exposure Management

Metasploit Weekly Wrap-Up 10/04/2024

Jacquie Harris's avatar

Jacquie Harris

The Main Components of an Attack Surface Management (ASM) Strategy

Rapid7 Blog

The Main Components of an Attack Surface Management (ASM) Strategy

Jon Schipp's avatar

Jon Schipp

Ransomware Groups Demystified: CyberVolk Ransomware

Detection and Response

Ransomware Groups Demystified: CyberVolk Ransomware

Rapid7 Labs's avatar

Rapid7 Labs

Modernizing Your VM Program with Rapid7 Exposure Command: A Path to Effective Continuous Threat Exposure Management

Products and Tools

Modernizing Your VM Program with Rapid7 Exposure Command: A Path to Effective Continuous Threat Exposure Management

Ryan Blanchard's avatar

Ryan Blanchard

What’s New in Rapid7 Products & Services: Q3 2024 in Review

Products and Tools

What’s New in Rapid7 Products & Services: Q3 2024 in Review

Margaret Wei's avatar

Margaret Wei

Proactive Visibility Is Foundational to Strong Cybersecurity

Rapid7 Blog

Proactive Visibility Is Foundational to Strong Cybersecurity

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 09/27/2024

Exposure Management

Metasploit Weekly Wrap-Up 09/27/2024

Christophe De La Fuente's avatar

Christophe De La Fuente

Multiple Vulnerabilities in Common Unix Printing System (CUPS)

Exposure Management

Multiple Vulnerabilities in Common Unix Printing System (CUPS)

Rapid7's avatar

Rapid7

Proactively Securing Cloud Workloads in the CI/CD Pipeline with Rapid7 and Azure DevOps

Products and Tools

Proactively Securing Cloud Workloads in the CI/CD Pipeline with Rapid7 and Azure DevOps

Ray Cochrane's avatar

Ray Cochrane

Rapid7 Recognized in Forrester’s 2024 Attack Surface Management (ASM) Wave Report

Threat Research

Rapid7 Recognized in Forrester’s 2024 Attack Surface Management (ASM) Wave Report

Rapid7's avatar

Rapid7