The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

4 Strategies to Help Your Cybersecurity Budget Work Harder

Security Operations

4 Strategies to Help Your Cybersecurity Budget Work Harder

Rapid7's avatar

Rapid7

CVE-2022-27511: Citrix ADM Remote Device Takeover

Exposure Management

CVE-2022-27511: Citrix ADM Remote Device Takeover

Erick Galinkin's avatar

Erick Galinkin

Security Is Shifting in a Cloud-Native World: Insights From RSAC 2022

Cloud and Devops Security

Security Is Shifting in a Cloud-Native World: Insights From RSAC 2022

Jesse Mack's avatar

Jesse Mack

New Report Shows What Data Is Most at Risk to (and Prized by) Ransomware Attackers

Threat Research

New Report Shows What Data Is Most at Risk to (and Prized by) Ransomware Attackers

Rapid7's avatar

Rapid7

Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition

Threat Research

Complimentary GartnerⓇ Report "How to Respond to the 2022 Cyberthreat Landscape": Ransomware Edition

Tom Caiazza's avatar

Tom Caiazza

Patch Tuesday - June 2022

Exposure Management

Patch Tuesday - June 2022

Greg Wiseman's avatar

Greg Wiseman

CVE-2022-32230: Windows SMB Denial-of-Service Vulnerability (FIXED)

Threat Research

CVE-2022-32230: Windows SMB Denial-of-Service Vulnerability (FIXED)

Spencer McIntyre's avatar

Spencer McIntyre

Defending Against Tomorrow's Threats: Insights From RSAC 2022

Threat Research

Defending Against Tomorrow's Threats: Insights From RSAC 2022

Jesse Mack's avatar

Jesse Mack

Metasploit Weekly Wrap-Up: 6/10/22

Exposure Management

Metasploit Weekly Wrap-Up: 6/10/22

Brendan Watters's avatar

Brendan Watters

[VIDEO] An Inside Look at the RSA 2022 Experience From the Rapid7 Team​

Threat Research

[VIDEO] An Inside Look at the RSA 2022 Experience From the Rapid7 Team​

Jesse Mack's avatar

Jesse Mack

Announcing Metasploit 6.2

Exposure Management

Announcing Metasploit 6.2

Alan David Foster's avatar

Alan David Foster

Identifying Cloud Waste to Contain Unnecessary Costs

Products and Tools

Identifying Cloud Waste to Contain Unnecessary Costs

Ryan Blanchard's avatar

Ryan Blanchard

The Hidden Harm of Silent Patches

Industry Trends

The Hidden Harm of Silent Patches

Tod Beardsley's avatar

Tod Beardsley

Evaluating the Security of an Enterprise IoT Deployment at Domino's Pizza

Detection and Response

Evaluating the Security of an Enterprise IoT Deployment at Domino's Pizza

Deral Heiland's avatar

Deral Heiland

Metasploit Weekly Wrap-Up: 6/3/22

Exposure Management

Metasploit Weekly Wrap-Up: 6/3/22

Jeffrey Martin's avatar

Jeffrey Martin

Cybersecurity Is More Than a Checklist: Joel Yonts on Tech’s Unfair Disadvantage

Industry Trends

Cybersecurity Is More Than a Checklist: Joel Yonts on Tech’s Unfair Disadvantage

Peter Scott's avatar

Peter Scott

Active Exploitation of Confluence CVE-2022-26134

Exposure Management

Active Exploitation of Confluence CVE-2022-26134

Rapid7's avatar

Rapid7

The Average SIEM Deployment Takes 6 Months. Don’t Be Average.

Products and Tools

The Average SIEM Deployment Takes 6 Months. Don’t Be Average.

Margaret Wei's avatar

Margaret Wei

CVE-2022-30190: "Follina" Microsoft Support Diagnostic Tool Vulnerability

Exposure Management

CVE-2022-30190: "Follina" Microsoft Support Diagnostic Tool Vulnerability

Rapid7's avatar

Rapid7

3 Takeaways From the 2022 Verizon Data Breach Investigations Report

Exposure Management

3 Takeaways From the 2022 Verizon Data Breach Investigations Report

Jesse Mack's avatar

Jesse Mack

Metasploit Weekly Wrap-Up: 5/27/22

Exposure Management

Metasploit Weekly Wrap-Up: 5/27/22

Alan David Foster's avatar

Alan David Foster