The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

The Future of the SOC Is XDR

Security Operations

The Future of the SOC Is XDR

Dina Durutlic's avatar

Dina Durutlic

Primary Arms PII Disclosure via IDOR (FIXED)

Threat Research

Primary Arms PII Disclosure via IDOR (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Collaboration Drives Secure Cloud Innovation: Insights From AWS re:Inforce

Cloud and Devops Security

Collaboration Drives Secure Cloud Innovation: Insights From AWS re:Inforce

Jesse Mack's avatar

Jesse Mack

Shift Left: Secure Your Innovation Pipeline

Products and Tools

Shift Left: Secure Your Innovation Pipeline

Ryan Blanchard's avatar

Ryan Blanchard

Metasploit Weekly Wrap-Up: Jul. 29, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Jul. 29, 2022

Spencer McIntyre's avatar

Spencer McIntyre

[VIDEO] An Inside Look at AWS re:Inforce 2022 From the Rapid7 Team

Cloud and Devops Security

[VIDEO] An Inside Look at AWS re:Inforce 2022 From the Rapid7 Team

Jesse Mack's avatar

Jesse Mack

[The Lost Bots] Season 2, Episode 2: The Worst and Best Hollywood Cybersecurity Depictions

Detection and Response

[The Lost Bots] Season 2, Episode 2: The Worst and Best Hollywood Cybersecurity Depictions

Rapid7's avatar

Rapid7

What’s New in InsightVM and Nexpose: Q2 2022 in Review

Products and Tools

What’s New in InsightVM and Nexpose: Q2 2022 in Review

Randi Whitcomb's avatar

Randi Whitcomb

Active Exploitation of Atlassian’s Questions for Confluence App CVE-2022-26138

Exposure Management

Active Exploitation of Atlassian’s Questions for Confluence App CVE-2022-26138

Glenn Thorpe's avatar

Glenn Thorpe

To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved

Exposure Management

To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved

Tom Caiazza's avatar

Tom Caiazza

5 SOAR Myths Debunked

Detection and Response

5 SOAR Myths Debunked

Matthew Gardiner's avatar

Matthew Gardiner

Rapid7 at AWS re:Inforce: 2 Big Announcements

Products and Tools

Rapid7 at AWS re:Inforce: 2 Big Announcements

Aaron Sawitsky's avatar

Aaron Sawitsky

CVE-2022-35629..35632 Velociraptor Multiple Vulnerabilities (FIXED)

Products and Tools

CVE-2022-35629..35632 Velociraptor Multiple Vulnerabilities (FIXED)

Mike Cohen's avatar

Mike Cohen

ISO 27002 Emphasizes Need For Threat Intelligence

Threat Research

ISO 27002 Emphasizes Need For Threat Intelligence

Drew Burton's avatar

Drew Burton

What We’re Looking Forward to at AWS re:Inforce

Products and Tools

What We’re Looking Forward to at AWS re:Inforce

Jesse Mack's avatar

Jesse Mack

Metasploit Weekly Wrap-Up: 7/22/22

Exposure Management

Metasploit Weekly Wrap-Up: 7/22/22

Christophe De La Fuente's avatar

Christophe De La Fuente

Cloud Threat Detection: To Agent or Not to Agent?

Products and Tools

Cloud Threat Detection: To Agent or Not to Agent?

Gadi Naor's avatar

Gadi Naor

Simplify SIEM Optimization With InsightIDR

Products and Tools

Simplify SIEM Optimization With InsightIDR

Margaret Wei's avatar

Margaret Wei

4 Key Statistics to Build a Business Case for an MDR Partner

Products and Tools

4 Key Statistics to Build a Business Case for an MDR Partner

Jake Godgart's avatar

Jake Godgart

Deploying a SOAR Tool Doesn’t Have to Be Hard: I’ve Done It Twice

Products and Tools

Deploying a SOAR Tool Doesn’t Have to Be Hard: I’ve Done It Twice

Ryan Fried's avatar

Ryan Fried

4 Strategies for Achieving Greater Visibility in the Cloud

Cloud and Devops Security

4 Strategies for Achieving Greater Visibility in the Cloud

Jesse Mack's avatar

Jesse Mack