The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

When Your Calendar Becomes the Compromise

Vulnerabilities and Exploits

When Your Calendar Becomes the Compromise

Rapid7 Labs's avatar

Rapid7 Labs

MDR ROI, Proven Outcomes, and What Security Leaders Need to Ask For

Industry Trends

MDR ROI, Proven Outcomes, and What Security Leaders Need to Ask For

Rapid7's avatar

Rapid7

2025 Cybersecurity Predictions: How did we do?

Industry Trends

2025 Cybersecurity Predictions: How did we do?

Rapid7's avatar

Rapid7

The End Of Legacy SIEM: Why It’s Time To Take Command

Detection and Response

The End Of Legacy SIEM: Why It’s Time To Take Command

Rapid7's avatar

Rapid7

Rapid7 Extends AWS Hosting Capability with India Region Launch

Products and Tools

Rapid7 Extends AWS Hosting Capability with India Region Launch

Ed Montgomery's avatar

Ed Montgomery

4 Takeaways from the 2025 Gartner® Market Guide for Managed Detection and Response

Detection and Response

4 Takeaways from the 2025 Gartner® Market Guide for Managed Detection and Response

Emma Burdett's avatar

Emma Burdett

Metasploit Wrap-Up 10/31/2025

Products and Tools

Metasploit Wrap-Up 10/31/2025

Dean Welch's avatar

Dean Welch

When AI Accelerates Cloud Migrations, Don't Let Security Be an Afterthought

Cloud and Devops Security

When AI Accelerates Cloud Migrations, Don't Let Security Be an Afterthought

Tim Schmidt's avatar

Tim Schmidt

Salt Typhoon APT Group: What Public Sector Leaders and Defenders Should Know

Threat Research

Salt Typhoon APT Group: What Public Sector Leaders and Defenders Should Know

Rapid7 Labs's avatar

Rapid7 Labs

Remediate Vulnerabilities Faster with AI-generated Risk Intelligence

Products and Tools

Remediate Vulnerabilities Faster with AI-generated Risk Intelligence

Michael Chroney's avatar

Michael Chroney

Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence

Products and Tools

Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence

Stephen Fewer's avatar

Stephen Fewer

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond

Industry Trends

Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond

Jeremy Makowski's avatar

Jeremy Makowski

Metasploit Wrap-Up 10/24/2025

Products and Tools

Metasploit Wrap-Up 10/24/2025

Martin Sutovsky's avatar

Martin Sutovsky

Rapid7 at Pwn2Own: Raising the Bar in Vuln Intel

Vulnerabilities and Exploits

Rapid7 at Pwn2Own: Raising the Bar in Vuln Intel

Stephen Fewer's avatar

Stephen Fewer

The business value of MDR: Why organizations are achieving 422% ROI with Rapid7

Detection and Response

The business value of MDR: Why organizations are achieving 422% ROI with Rapid7

Rapid7's avatar

Rapid7

Independent Results Confirm Rapid7’s NGAV Delivers Strong, Reliable Protection

Products and Tools

Independent Results Confirm Rapid7’s NGAV Delivers Strong, Reliable Protection

Avi Ashkenazi's avatar

Avi Ashkenazi

Metasploit Wrap-Up 10/17/2025

Products and Tools

Metasploit Wrap-Up 10/17/2025

Jacquie Harris's avatar

Jacquie Harris

Pen, Paper, and Preparedness: What the UK's Latest Cyber Guidance Really Means

Industry Trends

Pen, Paper, and Preparedness: What the UK's Latest Cyber Guidance Really Means

Emma Burdett's avatar

Emma Burdett

Inside the F5 Breach: What We Know and Recommended Actions

Vulnerabilities and Exploits

Inside the F5 Breach: What We Know and Recommended Actions

Rapid7's avatar

Rapid7

When the Call Comes from Inside: The Rising Threat of Insider Recruitment in Ransomware Campaigns

Industry Trends

When the Call Comes from Inside: The Rising Threat of Insider Recruitment in Ransomware Campaigns

Rapid7's avatar

Rapid7

Rapid7: 7 years of recognition in Gartner® Magic Quadrant™ for SIEM

Detection and Response

Rapid7: 7 years of recognition in Gartner® Magic Quadrant™ for SIEM

Cindy Stanton's avatar

Cindy Stanton