The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Patch Tuesday - September 2022

Detection and Response

Patch Tuesday - September 2022

Greg Wiseman's avatar

Greg Wiseman

Grey Time: The Hidden Cost of Incident Response

Detection and Response

Grey Time: The Hidden Cost of Incident Response

Joshua Harr's avatar

Joshua Harr

Getting the most out of your InsightVM console

Products and Tools

Getting the most out of your InsightVM console

Shane Queeney's avatar

Shane Queeney

Metasploit Weekly Wrap-Up: 9/9/22

Exposure Management

Metasploit Weekly Wrap-Up: 9/9/22

Navya Harika Karaka's avatar

Navya Harika Karaka

Integrating Cloud Security With DevOps and CI/CD Tools

Cloud and Devops Security

Integrating Cloud Security With DevOps and CI/CD Tools

Clint Merrill's avatar

Clint Merrill

Baxter SIGMA Spectrum Infusion Pumps: Multiple Vulnerabilities (FIXED)

Detection and Response

Baxter SIGMA Spectrum Infusion Pumps: Multiple Vulnerabilities (FIXED)

Deral Heiland's avatar

Deral Heiland

VeloCON 2022: Digging Deeper Together!

Detection and Response

VeloCON 2022: Digging Deeper Together!

Carlos Canto's avatar

Carlos Canto

3 Ways to Improve Data Protection in the Cloud

Exposure Management

3 Ways to Improve Data Protection in the Cloud

Jesse Mack's avatar

Jesse Mack

5 Things Rapid7 Looks for in a BDR, and How We Spot Them

Rapid7 Blog

5 Things Rapid7 Looks for in a BDR, and How We Spot Them

Rapid7's avatar

Rapid7

5 Steps for Dealing With Unknown Environments in InsightVM

Products and Tools

5 Steps for Dealing With Unknown Environments in InsightVM

John Hartman's avatar

John Hartman

Metasploit Weekly Wrap-Up: 9/2/22

Exposure Management

Metasploit Weekly Wrap-Up: 9/2/22

Christopher Granleese's avatar

Christopher Granleese

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Threat Research

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Erick Galinkin's avatar

Erick Galinkin

25 Years of Nmap: Happy Scan-iversary!

Exposure Management

25 Years of Nmap: Happy Scan-iversary!

Tod Beardsley's avatar

Tod Beardsley

Rapid7 Makes Security Compliance Complexity a Thing of the Past With InsightIDR

Products and Tools

Rapid7 Makes Security Compliance Complexity a Thing of the Past With InsightIDR

KJ McCann's avatar

KJ McCann

Metasploit Wrap-Up: Aug. 26, 2022

Exposure Management

Metasploit Wrap-Up: Aug. 26, 2022

Shelby Pace's avatar

Shelby Pace

Incident Reporting Regulations Summary and Chart

Industry Trends

Incident Reporting Regulations Summary and Chart

Harley Geiger's avatar

Harley Geiger

[The Lost Bots] S02E03: Browser-in-Browser Attacks — Don't Get (Cat)-Phished

Detection and Response

[The Lost Bots] S02E03: Browser-in-Browser Attacks — Don't Get (Cat)-Phished

Rapid7's avatar

Rapid7

Cybersecurity Analysts: Job Stress Is Bad, but Boredom Is Kryptonite

Security Operations

Cybersecurity Analysts: Job Stress Is Bad, but Boredom Is Kryptonite

Amy Hunt's avatar

Amy Hunt

Avoiding Smash and Grab Under the SEC’s Proposed Cyber Rule

Detection and Response

Avoiding Smash and Grab Under the SEC’s Proposed Cyber Rule

Harley Geiger's avatar

Harley Geiger

Network Access for Sale: Protect Your Organization Against This Growing Threat

Vulnerabilities and Exploits

Network Access for Sale: Protect Your Organization Against This Growing Threat

Jeremy Makowski's avatar

Jeremy Makowski

Metasploit Wrap-Up: 8/19/22

Exposure Management

Metasploit Wrap-Up: 8/19/22

Alan David Foster's avatar

Alan David Foster