The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved

Exposure Management

To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved

Tom Caiazza's avatar

Tom Caiazza

5 SOAR Myths Debunked

Detection and Response

5 SOAR Myths Debunked

Matthew Gardiner's avatar

Matthew Gardiner

Rapid7 at AWS re:Inforce: 2 Big Announcements

Products and Tools

Rapid7 at AWS re:Inforce: 2 Big Announcements

Aaron Sawitsky's avatar

Aaron Sawitsky

CVE-2022-35629..35632 Velociraptor Multiple Vulnerabilities (FIXED)

Products and Tools

CVE-2022-35629..35632 Velociraptor Multiple Vulnerabilities (FIXED)

Mike Cohen's avatar

Mike Cohen

ISO 27002 Emphasizes Need For Threat Intelligence

Threat Research

ISO 27002 Emphasizes Need For Threat Intelligence

Drew Burton's avatar

Drew Burton

What We’re Looking Forward to at AWS re:Inforce

Products and Tools

What We’re Looking Forward to at AWS re:Inforce

Jesse Mack's avatar

Jesse Mack

Metasploit Weekly Wrap-Up: 7/22/22

Exposure Management

Metasploit Weekly Wrap-Up: 7/22/22

Christophe De La Fuente's avatar

Christophe De La Fuente

Cloud Threat Detection: To Agent or Not to Agent?

Products and Tools

Cloud Threat Detection: To Agent or Not to Agent?

Gadi Naor's avatar

Gadi Naor

Simplify SIEM Optimization With InsightIDR

Products and Tools

Simplify SIEM Optimization With InsightIDR

Margaret Wei's avatar

Margaret Wei

Deploying a SOAR Tool Doesn’t Have to Be Hard: I’ve Done It Twice

Products and Tools

Deploying a SOAR Tool Doesn’t Have to Be Hard: I’ve Done It Twice

Ryan Fried's avatar

Ryan Fried

4 Key Statistics to Build a Business Case for an MDR Partner

Products and Tools

4 Key Statistics to Build a Business Case for an MDR Partner

Jake Godgart's avatar

Jake Godgart

4 Strategies for Achieving Greater Visibility in the Cloud

Cloud and Devops Security

4 Strategies for Achieving Greater Visibility in the Cloud

Jesse Mack's avatar

Jesse Mack

Gimme! Gimme! Gimme! (More Data): What Security Pros Are Saying

Security Operations

Gimme! Gimme! Gimme! (More Data): What Security Pros Are Saying

Dina Durutlic's avatar

Dina Durutlic

CVE-2022-30526 (Fixed): Zyxel Firewall Local Privilege Escalation

Vulnerabilities and Exploits

CVE-2022-30526 (Fixed): Zyxel Firewall Local Privilege Escalation

Jake Baines's avatar

Jake Baines

Deploy tCell More Easily With the New AWS AMI Agent

Products and Tools

Deploy tCell More Easily With the New AWS AMI Agent

Tom Caiazza's avatar

Tom Caiazza

Metasploit Weekly Wrap-Up: Jul 15, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Jul 15, 2022

Grant Willcox's avatar

Grant Willcox

InsightVM Release Update: Let’s Focus on Remediation for Just a Minute

Products and Tools

InsightVM Release Update: Let’s Focus on Remediation for Just a Minute

Devin Krugly's avatar

Devin Krugly

It’s the Summer of AppSec: Q2 Improvements to Our Industry-Leading DAST and WAAP

Products and Tools

It’s the Summer of AppSec: Q2 Improvements to Our Industry-Leading DAST and WAAP

Tom Caiazza's avatar

Tom Caiazza

Creating an Exceptional Workplace: Building and Expansion in a Post-COVID World

Rapid7 Blog

Creating an Exceptional Workplace: Building and Expansion in a Post-COVID World

Jamie Kinch's avatar

Jamie Kinch

Patch Tuesday - July 2022

Detection and Response

Patch Tuesday - July 2022

Greg Wiseman's avatar

Greg Wiseman

The Forecast Is Flipped: Flipping L&D to Ensure Continuous Growth

Culture

The Forecast Is Flipped: Flipping L&D to Ensure Continuous Growth

Courtney Campbell's avatar

Courtney Campbell