The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

5 Things Rapid7 Looks for in a BDR, and How We Spot Them

Rapid7 Blog

5 Things Rapid7 Looks for in a BDR, and How We Spot Them

Rapid7's avatar

Rapid7

5 Steps for Dealing With Unknown Environments in InsightVM

Products and Tools

5 Steps for Dealing With Unknown Environments in InsightVM

John Hartman's avatar

John Hartman

Metasploit Weekly Wrap-Up: 9/2/22

Exposure Management

Metasploit Weekly Wrap-Up: 9/2/22

Christopher Granleese's avatar

Christopher Granleese

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Threat Research

Architecting for Extortion: Acting on the IST’s Blueprint for Ransomware Defense

Erick Galinkin's avatar

Erick Galinkin

25 Years of Nmap: Happy Scan-iversary!

Exposure Management

25 Years of Nmap: Happy Scan-iversary!

Tod Beardsley's avatar

Tod Beardsley

Rapid7 Makes Security Compliance Complexity a Thing of the Past With InsightIDR

Products and Tools

Rapid7 Makes Security Compliance Complexity a Thing of the Past With InsightIDR

KJ McCann's avatar

KJ McCann

Metasploit Wrap-Up: Aug. 26, 2022

Exposure Management

Metasploit Wrap-Up: Aug. 26, 2022

Shelby Pace's avatar

Shelby Pace

Incident Reporting Regulations Summary and Chart

Industry Trends

Incident Reporting Regulations Summary and Chart

Harley Geiger's avatar

Harley Geiger

[The Lost Bots] S02E03: Browser-in-Browser Attacks — Don't Get (Cat)-Phished

Detection and Response

[The Lost Bots] S02E03: Browser-in-Browser Attacks — Don't Get (Cat)-Phished

Rapid7's avatar

Rapid7

Cybersecurity Analysts: Job Stress Is Bad, but Boredom Is Kryptonite

Security Operations

Cybersecurity Analysts: Job Stress Is Bad, but Boredom Is Kryptonite

Amy Hunt's avatar

Amy Hunt

Avoiding Smash and Grab Under the SEC’s Proposed Cyber Rule

Detection and Response

Avoiding Smash and Grab Under the SEC’s Proposed Cyber Rule

Harley Geiger's avatar

Harley Geiger

Network Access for Sale: Protect Your Organization Against This Growing Threat

Vulnerabilities and Exploits

Network Access for Sale: Protect Your Organization Against This Growing Threat

Jeremy Makowski's avatar

Jeremy Makowski

Metasploit Wrap-Up: 8/19/22

Exposure Management

Metasploit Wrap-Up: 8/19/22

Alan David Foster's avatar

Alan David Foster

Pushing Open-Source Security Forward: Insights From Black Hat 2022

Products and Tools

Pushing Open-Source Security Forward: Insights From Black Hat 2022

Jesse Mack's avatar

Jesse Mack

360-Degree XDR and Attack Surface Coverage With Rapid7

Products and Tools

360-Degree XDR and Attack Surface Coverage With Rapid7

Margaret Wei's avatar

Margaret Wei

Leading the Way in Tampa

Rapid7 Blog

Leading the Way in Tampa

Julian Waits's avatar

Julian Waits

Active Exploitation of Multiple Vulnerabilities in Zimbra Collaboration Suite

Exposure Management

Active Exploitation of Multiple Vulnerabilities in Zimbra Collaboration Suite

Caitlin Condon's avatar

Caitlin Condon

Are Your Apps Exposed? Know Faster With Application Discovery in InsightAppSec

Products and Tools

Are Your Apps Exposed? Know Faster With Application Discovery in InsightAppSec

Ronan McCrory's avatar

Ronan McCrory

[VIDEO] An Inside Look at Black Hat 2022 From the Rapid7 Team

Rapid7 Blog

[VIDEO] An Inside Look at Black Hat 2022 From the Rapid7 Team

Jesse Mack's avatar

Jesse Mack

Metasploit Weekly Wrap-Up: 8/12/22

Products and Tools

Metasploit Weekly Wrap-Up: 8/12/22

Jeffrey Martin's avatar

Jeffrey Martin

3 Mistakes Companies Make in Their Detection and Response Programs

Products and Tools

3 Mistakes Companies Make in Their Detection and Response Programs

Jake Godgart's avatar

Jake Godgart