The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Reduce Risk and Regain Control with Cloud Risk Complete

Products and Tools

Reduce Risk and Regain Control with Cloud Risk Complete

Marla Rosner's avatar

Marla Rosner

Celebrating Women’s History Month at Rapid7

Rapid7 Blog

Celebrating Women’s History Month at Rapid7

Rapid7's avatar

Rapid7

CVE-2023-0391: MGT-COMMERCE CloudPanel Shared Certificate Vulnerability and Weak Installation Procedures

Vulnerabilities and Exploits

CVE-2023-0391: MGT-COMMERCE CloudPanel Shared Certificate Vulnerability and Weak Installation Procedures

Tod Beardsley's avatar

Tod Beardsley

Rapid7-Observed Exploitation of Adobe ColdFusion

Threat Research

Rapid7-Observed Exploitation of Adobe ColdFusion

Clayton Zechman's avatar

Clayton Zechman

Practice Operations Manager Looks Back On First Five Months With Rapid7

Rapid7 Blog

Practice Operations Manager Looks Back On First Five Months With Rapid7

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up: 3/17/23

Exposure Management

Metasploit Weekly Wrap-Up: 3/17/23

Grant Willcox's avatar

Grant Willcox

MITRE ATT&CK® Mitigations

Security Operations

MITRE ATT&CK® Mitigations

James Alaniz's avatar

James Alaniz

Rapid7 Threat Command Delivered 311% ROI: 2023 Forrester Consulting Total Economic Impact™ Study

Products and Tools

Rapid7 Threat Command Delivered 311% ROI: 2023 Forrester Consulting Total Economic Impact™ Study

Stacy Moran's avatar

Stacy Moran

Build Security Muscle Memory With Tabletop Exercises

Rapid7 Blog

Build Security Muscle Memory With Tabletop Exercises

Joshua Harr's avatar

Joshua Harr

3 Steps for Ramping Up to Fully Automated Remediation

Exposure Management

3 Steps for Ramping Up to Fully Automated Remediation

Marla Rosner's avatar

Marla Rosner

Patch Tuesday - March 2023

Detection and Response

Patch Tuesday - March 2023

Adam Barnett's avatar

Adam Barnett

Microsoft Defender for Cloud Management Port Exposure Confusion

Vulnerabilities and Exploits

Microsoft Defender for Cloud Management Port Exposure Confusion

Tod Beardsley's avatar

Tod Beardsley

Executive Webinar: Confronting Security Fears to Control Cyber Risk, Part Two

Industry Trends

Executive Webinar: Confronting Security Fears to Control Cyber Risk, Part Two

Rapid7's avatar

Rapid7

Cloud Security Strategies for Healthcare

Industry Trends

Cloud Security Strategies for Healthcare

Marla Rosner's avatar

Marla Rosner

Metasploit Weekly Wrap-Up: Mar. 10, 2023

Exposure Management

Metasploit Weekly Wrap-Up: Mar. 10, 2023

Jack Heysel's avatar

Jack Heysel

[The Lost Bots] S03E01: Tech Stack Consolidation and Bacon

Security Operations

[The Lost Bots] S03E01: Tech Stack Consolidation and Bacon

Amy Hunt's avatar

Amy Hunt

What Tech Companies Should Look For in Cloud Security

Cloud and Devops Security

What Tech Companies Should Look For in Cloud Security

Marla Rosner's avatar

Marla Rosner

Vulnerability Management vs. Vulnerability Assessment

Exposure Management

Vulnerability Management vs. Vulnerability Assessment

Marla Rosner's avatar

Marla Rosner

Metasploit Weekly Wrap-Up: 3/3/23

Exposure Management

Metasploit Weekly Wrap-Up: 3/3/23

Zachary Goldman's avatar

Zachary Goldman

New InsightCloudSec Compliance Pack: Key Takeaways From the Azure Security Benchmark V3

Products and Tools

New InsightCloudSec Compliance Pack: Key Takeaways From the Azure Security Benchmark V3

James Alaniz's avatar

James Alaniz

Active Exploitation of ZK Framework CVE-2022-36537

Threat Research

Active Exploitation of ZK Framework CVE-2022-36537

Stephen Fewer's avatar

Stephen Fewer