The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

From .pth to p0wned: Abuse of Pickle Files in AI Model Supply Chains

Threat Research

From .pth to p0wned: Abuse of Pickle Files in AI Model Supply Chains

Christiaan Beek's avatar

Christiaan Beek

Scattered Spider: Rapid7 Insights, Observations, and Recommendations

Threat Research

Scattered Spider: Rapid7 Insights, Observations, and Recommendations

Rapid7 Labs's avatar

Rapid7 Labs

From Ideology to Financial Gain: Exploring the Convergence from Hacktivism to Cybercrime

Threat Research

From Ideology to Financial Gain: Exploring the Convergence from Hacktivism to Cybercrime

Alexandra Blia's avatar
Yaniv Allender's avatar

Alexandra Blia, Yaniv Allender

Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)

Threat Research

Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)

Ryan Emmons's avatar

Ryan Emmons

From Noise to Action: Introducing Intelligence Hub

Threat Research

From Noise to Action: Introducing Intelligence Hub

Raj Samani's avatar
Craig Adams's avatar

Raj Samani, Craig Adams

Why MDR In 2025 Is About Scaling With Purpose

Threat Research

Why MDR In 2025 Is About Scaling With Purpose

Craig Adams's avatar

Craig Adams

CVE-2025-1094: PostgreSQL psql SQL injection (FIXED)

Threat Research

CVE-2025-1094: PostgreSQL psql SQL injection (FIXED)

Stephen Fewer's avatar

Stephen Fewer

How To Protect Your Organization's Bluesky Account From Security Threats

Threat Research

How To Protect Your Organization's Bluesky Account From Security Threats

Chris Boyd's avatar

Chris Boyd

The 2024 Ransomware Landscape: Looking back on another painful year

Threat Research

The 2024 Ransomware Landscape: Looking back on another painful year

Christiaan Beek's avatar

Christiaan Beek

Perfect Fit or Business Threat? How to Mitigate the Risk of Rogue Employees

Threat Research

Perfect Fit or Business Threat? How to Mitigate the Risk of Rogue Employees

Chris Boyd's avatar

Chris Boyd

Out With the Old, In With the New: Securely Disposing of Smart Devices

Threat Research

Out With the Old, In With the New: Securely Disposing of Smart Devices

Deral Heiland's avatar

Deral Heiland

A Bag of RATs: VenomRAT vs. AsyncRAT

Threat Research

A Bag of RATs: VenomRAT vs. AsyncRAT

Anna Širokova's avatar

Anna Širokova

Multiple Vulnerabilities in Wowza Streaming Engine (Fixed)

Threat Research

Multiple Vulnerabilities in Wowza Streaming Engine (Fixed)

Ryan Emmons's avatar

Ryan Emmons

LodaRAT: Established Malware, New Victim Patterns

Threat Research

LodaRAT: Established Malware, New Victim Patterns

Natalie Zargarov's avatar

Natalie Zargarov

Rapid7 Recognized in Forrester’s 2024 Attack Surface Management (ASM) Wave Report

Threat Research

Rapid7 Recognized in Forrester’s 2024 Attack Surface Management (ASM) Wave Report

Rapid7's avatar

Rapid7

Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.

Threat Research

Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.

Tom Caiazza's avatar

Tom Caiazza

New Research: The Proliferation of Cellular in IoT

Threat Research

New Research: The Proliferation of Cellular in IoT

Rapid7's avatar

Rapid7

Defending Against APTs: A Learning Exercise with Kimsuky

Threat Research

Defending Against APTs: A Learning Exercise with Kimsuky

Raj Samani's avatar

Raj Samani

What’s New in Rapid7 Products & Services: Q2 2024 in Review

Threat Research

What’s New in Rapid7 Products & Services: Q2 2024 in Review

Margaret Wei's avatar

Margaret Wei

Rapid7 Releases the 2024 Attack Intelligence Report

Threat Research

Rapid7 Releases the 2024 Attack Intelligence Report

Rapid7's avatar

Rapid7

Why The External Attack Surface Matters: An analysis into APAC related threat activities

Threat Research

Why The External Attack Surface Matters: An analysis into APAC related threat activities

Rapid7's avatar

Rapid7