The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Go Inside Rapid7 MDR: Timelines and Tick Tocks

Products and Tools

Go Inside Rapid7 MDR: Timelines and Tick Tocks

Mikayla Wyman's avatar

Mikayla Wyman

Common questions when evolving your VM program

Exposure Management

Common questions when evolving your VM program

Rapid7's avatar

Rapid7

Hands-On IoT Hacking: Rapid7 at DEF CON 30 IoT Village, Pt. 3

Detection and Response

Hands-On IoT Hacking: Rapid7 at DEF CON 30 IoT Village, Pt. 3

Deral Heiland's avatar

Deral Heiland

CVE-2022-3786 and CVE-2022-3602: Two High-Severity Buffer Overflow Vulnerabilities in OpenSSL Fixed

Exposure Management

CVE-2022-3786 and CVE-2022-3602: Two High-Severity Buffer Overflow Vulnerabilities in OpenSSL Fixed

Rapid7's avatar

Rapid7

7 Rapid Questions with Toshio Honda, Sr. Security Solutions Engineer

Rapid7 Blog

7 Rapid Questions with Toshio Honda, Sr. Security Solutions Engineer

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up: Oct. 28, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Oct. 28, 2022

Shelby Pace's avatar

Shelby Pace

How to Foster Talent in a Cybersecurity Skills Gap

Industry Trends

How to Foster Talent in a Cybersecurity Skills Gap

Jake Godgart's avatar

Jake Godgart

CVE-2021-39144: VMware Cloud Foundation Unauthenticated Remote Code Execution

Vulnerabilities and Exploits

CVE-2021-39144: VMware Cloud Foundation Unauthenticated Remote Code Execution

Caitlin Condon's avatar

Caitlin Condon

Hands-On IoT Hacking: Rapid7 at DEF CON 30 IoT Village, Pt. 2

Detection and Response

Hands-On IoT Hacking: Rapid7 at DEF CON 30 IoT Village, Pt. 2

Deral Heiland's avatar

Deral Heiland

Adapting existing VM programs to regain control

Products and Tools

Adapting existing VM programs to regain control

Ryan Blanchard's avatar

Ryan Blanchard

Metasploit Weekly Wrap-Up: 10/21/22

Exposure Management

Metasploit Weekly Wrap-Up: 10/21/22

Spencer McIntyre's avatar

Spencer McIntyre

New Research: We’re Still Terrible at Passwords; Making it Easy for Attackers

Threat Research

New Research: We’re Still Terrible at Passwords; Making it Easy for Attackers

Tod Beardsley's avatar

Tod Beardsley

Hands-On IoT Hacking: Rapid7 at DEF CON 30 IoT Village, Part 1

Detection and Response

Hands-On IoT Hacking: Rapid7 at DEF CON 30 IoT Village, Part 1

Deral Heiland's avatar

Deral Heiland

Emerging best practices for securing cloud-native environments

Products and Tools

Emerging best practices for securing cloud-native environments

Rapid7's avatar

Rapid7

FLEXlm and Citrix ADM Denial of Service Vulnerability

Threat Research

FLEXlm and Citrix ADM Denial of Service Vulnerability

Ron Bowes's avatar

Ron Bowes

CVE-2022-42889: Keep Calm and Stop Saying "Text4Shell"

Exposure Management

CVE-2022-42889: Keep Calm and Stop Saying "Text4Shell"

Erick Galinkin's avatar

Erick Galinkin

Addressing the Evolving Attack Surface Part 1: Modern Challenges

Detection and Response

Addressing the Evolving Attack Surface Part 1: Modern Challenges

Bria Grangard's avatar

Bria Grangard

Metasploit Wrap-Up: 10/14/22

Exposure Management

Metasploit Wrap-Up: 10/14/22

Christophe De La Fuente's avatar

Christophe De La Fuente

Cloud IAM Done Right: How LPA Helps Significantly Reduce Cloud Risk

Security Operations

Cloud IAM Done Right: How LPA Helps Significantly Reduce Cloud Risk

Ryan Blanchard's avatar

Ryan Blanchard

A SIEM With a Pen Tester's Eye: How Offensive Security Helps Shape InsightIDR

Exposure Management

A SIEM With a Pen Tester's Eye: How Offensive Security Helps Shape InsightIDR

Rapid7's avatar

Rapid7

The Intelligent Listing: Cybersecurity Job Descriptions That Deliver

Security Operations

The Intelligent Listing: Cybersecurity Job Descriptions That Deliver

Jake Godgart's avatar

Jake Godgart