The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Keys to the Kingdom - Gaining access to the Physical Facility through Internal Access

Exposure Management

Keys to the Kingdom - Gaining access to the Physical Facility through Internal Access

Anna Katarina Quinn's avatar

Anna Katarina Quinn

Details Matter: Pentesting a single device to guarantee security

Exposure Management

Details Matter: Pentesting a single device to guarantee security

Ryan Smith's avatar

Ryan Smith

Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.

Threat Research

Rapid7’s Ransomware Radar Report Shows Threat Actors are Evolving …Fast.

Tom Caiazza's avatar

Tom Caiazza

Introducing the Rapid7 Command Platform

Products and Tools

Introducing the Rapid7 Command Platform

Corey Thomas's avatar

Corey Thomas

Rapid7 Introduces Exposure Command to Eliminate the Security Visibility Gap

Products and Tools

Rapid7 Introduces Exposure Command to Eliminate the Security Visibility Gap

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 08/02/2024

Exposure Management

Metasploit Weekly Wrap-Up 08/02/2024

Zachary Goldman's avatar

Zachary Goldman

New Cloud Risk Dashboard: Identifying Toxic Combinations to Drive Faster Remediation

Products and Tools

New Cloud Risk Dashboard: Identifying Toxic Combinations to Drive Faster Remediation

Pauline Logan's avatar

Pauline Logan

Celebrating Excellence: Rapid7 Recognized in Newsweek's Greatest Workplaces in America 2024

Rapid7 Blog

Celebrating Excellence: Rapid7 Recognized in Newsweek's Greatest Workplaces in America 2024

Rapid7's avatar

Rapid7

New Research: The Proliferation of Cellular in IoT

Threat Research

New Research: The Proliferation of Cellular in IoT

Rapid7's avatar

Rapid7

VMware ESXi CVE-2024-37085 Targeted in Ransomware Campaigns

Detection and Response

VMware ESXi CVE-2024-37085 Targeted in Ransomware Campaigns

Rapid7's avatar

Rapid7

Key Takeaways From The Take Command Summit: Building Resilient Cyber Defenses Through AI

Security Operations

Key Takeaways From The Take Command Summit: Building Resilient Cyber Defenses Through AI

Emma Burdett's avatar

Emma Burdett

Metasploit Weekly Wrap-Up 07/26/2024

Exposure Management

Metasploit Weekly Wrap-Up 07/26/2024

Jacquie Harris's avatar

Jacquie Harris

Key Takeaways From The Take Command Summit: Command Your Cloud

Security Operations

Key Takeaways From The Take Command Summit: Command Your Cloud

Emma Burdett's avatar

Emma Burdett

CVE-2024-6922: Automation Anywhere Automation 360 Server-Side Request Forgery

Exposure Management

CVE-2024-6922: Automation Anywhere Automation 360 Server-Side Request Forgery

Ryan Emmons's avatar

Ryan Emmons

From Top Dogs to Unified Pack

Rapid7 Blog

From Top Dogs to Unified Pack

Rapid7's avatar

Rapid7

Buying Stuff For Free From Shopping Websites

Exposure Management

Buying Stuff For Free From Shopping Websites

Marcus Chang's avatar

Marcus Chang

Malware Campaign Lures Users With Fake W2 Form

Vulnerabilities and Exploits

Malware Campaign Lures Users With Fake W2 Form

Tom Elkins's avatar

Tom Elkins

Metasploit Weekly Wrap-Up 7/19/2024

Vulnerabilities and Exploits

Metasploit Weekly Wrap-Up 7/19/2024

Christophe De La Fuente's avatar

Christophe De La Fuente

Unveiling Key Insights from the 2024 Take Command Summit

Security Operations

Unveiling Key Insights from the 2024 Take Command Summit

Emma Burdett's avatar

Emma Burdett

Defending Against APTs: A Learning Exercise with Kimsuky

Threat Research

Defending Against APTs: A Learning Exercise with Kimsuky

Raj Samani's avatar

Raj Samani

Metasploit Weekly Wrap-Up 07/12/2024

Exposure Management

Metasploit Weekly Wrap-Up 07/12/2024

Brendan Watters's avatar

Brendan Watters