The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

What’s New in InsightVM and Nexpose: Q3 2022 in Review

Products and Tools

What’s New in InsightVM and Nexpose: Q3 2022 in Review

Roshnee Mistry Shah's avatar

Roshnee Mistry Shah

How to Deploy a SIEM That Actually Works

Products and Tools

How to Deploy a SIEM That Actually Works

Robert Holzer's avatar

Robert Holzer

Metasploit Weekly Wrap-Up: 9/23/22

Exposure Management

Metasploit Weekly Wrap-Up: 9/23/22

Jeffrey Martin's avatar

Jeffrey Martin

Threat Intel Enhances Rapid7 XDR With Improved Visibility and Context

Products and Tools

Threat Intel Enhances Rapid7 XDR With Improved Visibility and Context

Stacy Moran's avatar

Stacy Moran

Prioritizing XDR in 2023: Stronger Detection and Response With Less Complexity

Detection and Response

Prioritizing XDR in 2023: Stronger Detection and Response With Less Complexity

KJ McCann's avatar

KJ McCann

How to Accelerate Your SOAR Program to Full Speed in Less Than a Year

Industry Trends

How to Accelerate Your SOAR Program to Full Speed in Less Than a Year

Ryan Fried's avatar

Ryan Fried

CVE-2022-36804: Easily Exploitable Vulnerability in Atlassian Bitbucket Server and Data Center

Exposure Management

CVE-2022-36804: Easily Exploitable Vulnerability in Atlassian Bitbucket Server and Data Center

Ron Bowes's avatar

Ron Bowes

Metasploit Weekly Wrap-Up: Sep. 16, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Sep. 16, 2022

Zachary Goldman's avatar

Zachary Goldman

The 2022 SANS Top New Attacks and Threats Report Is In, and It's Required Reading

Detection and Response

The 2022 SANS Top New Attacks and Threats Report Is In, and It's Required Reading

Tom Caiazza's avatar

Tom Caiazza

Patch Tuesday - September 2022

Detection and Response

Patch Tuesday - September 2022

Greg Wiseman's avatar

Greg Wiseman

Grey Time: The Hidden Cost of Incident Response

Detection and Response

Grey Time: The Hidden Cost of Incident Response

Joshua Harr's avatar

Joshua Harr

Getting the most out of your InsightVM console

Products and Tools

Getting the most out of your InsightVM console

Shane Queeney's avatar

Shane Queeney

Metasploit Weekly Wrap-Up: 9/9/22

Exposure Management

Metasploit Weekly Wrap-Up: 9/9/22

Navya Harika Karaka's avatar

Navya Harika Karaka

Integrating Cloud Security With DevOps and CI/CD Tools

Cloud and Devops Security

Integrating Cloud Security With DevOps and CI/CD Tools

Clint Merrill's avatar

Clint Merrill

Baxter SIGMA Spectrum Infusion Pumps: Multiple Vulnerabilities (FIXED)

Detection and Response

Baxter SIGMA Spectrum Infusion Pumps: Multiple Vulnerabilities (FIXED)

Deral Heiland's avatar

Deral Heiland

VeloCON 2022: Digging Deeper Together!

Detection and Response

VeloCON 2022: Digging Deeper Together!

Carlos Canto's avatar

Carlos Canto

3 Ways to Improve Data Protection in the Cloud

Exposure Management

3 Ways to Improve Data Protection in the Cloud

Jesse Mack's avatar

Jesse Mack

5 Things Rapid7 Looks for in a BDR, and How We Spot Them

Rapid7 Blog

5 Things Rapid7 Looks for in a BDR, and How We Spot Them

Rapid7's avatar

Rapid7

5 Steps for Dealing With Unknown Environments in InsightVM

Products and Tools

5 Steps for Dealing With Unknown Environments in InsightVM

John Hartman's avatar

John Hartman

Metasploit Weekly Wrap-Up: 9/2/22

Exposure Management

Metasploit Weekly Wrap-Up: 9/2/22

Christopher Granleese's avatar

Christopher Granleese

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Threat Research

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Erick Galinkin's avatar

Erick Galinkin