The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

MITRE Engenuity ATT&CK Evaluation: InsightIDR

Security Operations

MITRE Engenuity ATT&CK Evaluation: InsightIDR

Sam Adams's avatar

Sam Adams

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 2

Exposure Management

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 2

Ryan Weeks's avatar

Ryan Weeks

Spring4Shell: Zero-Day Vulnerability in Spring Framework (CVE-2022-22965)

Exposure Management

Spring4Shell: Zero-Day Vulnerability in Spring Framework (CVE-2022-22965)

Rapid7's avatar

Rapid7

Demystifying XDR: The Time for Implementation Is Now

Products and Tools

Demystifying XDR: The Time for Implementation Is Now

Jesse Mack's avatar

Jesse Mack

Cloud Pentesting, Pt. 2: Testing Across Different Deployments

Exposure Management

Cloud Pentesting, Pt. 2: Testing Across Different Deployments

Eric Mortaro's avatar

Eric Mortaro

CVE-2022-1026: Kyocera Net View Address Book Exposure

Threat Research

CVE-2022-1026: Kyocera Net View Address Book Exposure

Tod Beardsley's avatar

Tod Beardsley

Rapid7 Announces Partner of the Year Awards 2022 Winners

Rapid7 Blog

Rapid7 Announces Partner of the Year Awards 2022 Winners

Rapid7's avatar

Rapid7

Analyzing the Attack Landscape: Rapid7’s 2021 Vulnerability Intelligence Report

Exposure Management

Analyzing the Attack Landscape: Rapid7’s 2021 Vulnerability Intelligence Report

Caitlin Condon's avatar

Caitlin Condon

Metasploit Weekly Wrap-Up: Mar. 25, 2022

Products and Tools

Metasploit Weekly Wrap-Up: Mar. 25, 2022

Spencer McIntyre's avatar

Spencer McIntyre

The Digital Citizen’s Guide to Navigating Cyber Conflict

Industry Trends

The Digital Citizen’s Guide to Navigating Cyber Conflict

Jen Ellis's avatar

Jen Ellis

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 1

Exposure Management

4 Fallacies That Keep SMBs Vulnerable to Ransomware, Pt. 1

Ryan Weeks's avatar

Ryan Weeks

Reflecting on Women’s History Month at Rapid7

Rapid7 Blog

Reflecting on Women’s History Month at Rapid7

Rapid7's avatar

Rapid7

SIEM and XDR: What’s Converging, What’s Not

Products and Tools

SIEM and XDR: What’s Converging, What’s Not

Amy Hunt's avatar

Amy Hunt

Rapid7 Recognized as Top Ranked in Forrester Wave™ for Cloud Workload Security

Threat Research

Rapid7 Recognized as Top Ranked in Forrester Wave™ for Cloud Workload Security

Ben Austin's avatar

Ben Austin

8 Tips for Securing Networks When Time Is Scarce

Threat Research

8 Tips for Securing Networks When Time Is Scarce

Erick Galinkin's avatar

Erick Galinkin

Cloud Pentesting, Pt. 1: Breaking Down the Basics

Exposure Management

Cloud Pentesting, Pt. 1: Breaking Down the Basics

Eric Mortaro's avatar

Eric Mortaro

Metasploit Weekly Wrap-Up: Mar. 18, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Mar. 18, 2022

Alan David Foster's avatar

Alan David Foster

3 Ways to Leverage the MITRE ATT&CK Framework

Security Operations

3 Ways to Leverage the MITRE ATT&CK Framework

KJ McCann's avatar

KJ McCann

The VM Lifecycle: How We Got Here, and Where We’re Going

Security Operations

The VM Lifecycle: How We Got Here, and Where We’re Going

Devin Krugly's avatar

Devin Krugly

Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls

Security Operations

Cybercriminals’ Recruiting Effort Highlights Need for Proper User Access Controls

Jeremy Makowski's avatar

Jeremy Makowski

InsightVM Scanning: Demystifying SSH Credential Elevation

Products and Tools

InsightVM Scanning: Demystifying SSH Credential Elevation

Emmett Kelly's avatar

Emmett Kelly