The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition

Threat Research

Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition

Tom Caiazza's avatar

Tom Caiazza

CVE-2022-32230: Windows SMB Denial-of-Service Vulnerability (FIXED)

Threat Research

CVE-2022-32230: Windows SMB Denial-of-Service Vulnerability (FIXED)

Spencer McIntyre's avatar

Spencer McIntyre

Defending Against Tomorrow's Threats: Insights From RSAC 2022

Threat Research

Defending Against Tomorrow's Threats: Insights From RSAC 2022

Jesse Mack's avatar

Jesse Mack

[VIDEO] An Inside Look at the RSA 2022 Experience From the Rapid7 Team​

Threat Research

[VIDEO] An Inside Look at the RSA 2022 Experience From the Rapid7 Team​

Jesse Mack's avatar

Jesse Mack

[Infographic] Cloud Misconfigurations: Don't Become a Breach Statistic

Threat Research

[Infographic] Cloud Misconfigurations: Don't Become a Breach Statistic

Rapid7's avatar

Rapid7

2022 Cloud Misconfigurations Report: Cloud Security Breaches and Attack Trends

Threat Research

2022 Cloud Misconfigurations Report: Cloud Security Breaches and Attack Trends

Jacob Roundy's avatar

Jacob Roundy

MDR Plus Threat Intel: 414 New Detections in 251 Days (You’re Welcome)

Threat Research

MDR Plus Threat Intel: 414 New Detections in 251 Days (You’re Welcome)

Sam Adams's avatar

Sam Adams

CVE-2022-1026: Kyocera Net View Address Book Exposure

Threat Research

CVE-2022-1026: Kyocera Net View Address Book Exposure

Tod Beardsley's avatar

Tod Beardsley

Rapid7 Recognized as Top Ranked in Forrester Wave™ for Cloud Workload Security

Threat Research

Rapid7 Recognized as Top Ranked in Forrester Wave™ for Cloud Workload Security

Ben Austin's avatar

Ben Austin

8 Tips for Securing Networks When Time Is Scarce

Threat Research

8 Tips for Securing Networks When Time Is Scarce

Erick Galinkin's avatar

Erick Galinkin

Russia-Ukraine Cybersecurity Updates

Threat Research

Russia-Ukraine Cybersecurity Updates

Rapid7's avatar

Rapid7

The Top 5 Russian Cyber Threat Actors to Watch

Threat Research

The Top 5 Russian Cyber Threat Actors to Watch

Rapid7's avatar

Rapid7

CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)

Threat Research

CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)

Jake Baines's avatar

Jake Baines

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Threat Research

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Rapid7's avatar

Rapid7

For Health Insurance Companies, Web Apps Can Be an Open Wound

Threat Research

For Health Insurance Companies, Web Apps Can Be an Open Wound

Paul Prudhomme's avatar

Paul Prudhomme

Metasploit Wrap-Up: Feb. 11, 2022

Threat Research

Metasploit Wrap-Up: Feb. 11, 2022

Christophe De La Fuente's avatar

Christophe De La Fuente

The Big Target on Cyber Insurers' Backs

Threat Research

The Big Target on Cyber Insurers' Backs

Paul Prudhomme's avatar

Paul Prudhomme

Is the Internet of Things the Next Ransomware Target?

Threat Research

Is the Internet of Things the Next Ransomware Target?

Deral Heiland's avatar

Deral Heiland

Open-Source Security: Getting to the Root of the Problem

Threat Research

Open-Source Security: Getting to the Root of the Problem

Matthew Kienow's avatar

Matthew Kienow

Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List

Threat Research

Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List

Erick Galinkin's avatar

Erick Galinkin

A Quick Look at CES 2022

Threat Research

A Quick Look at CES 2022

Deral Heiland's avatar

Deral Heiland