The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

An Inside Look at CISA’s Supply Chain Task Force

Industry Trends

An Inside Look at CISA’s Supply Chain Task Force

Chad Kliewer, MS, CISSP, CCSP's avatar

Chad Kliewer, MS, CISSP, CCSP

Metasploit Weekly Wrap-Up: Mar. 11, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Mar. 11, 2022

Jeffrey Martin's avatar

Jeffrey Martin

Run Faster Log Searches With InsightIDR

Products and Tools

Run Faster Log Searches With InsightIDR

Teresa Copple's avatar

Teresa Copple

7 Rapid Questions: Growing From BDR to Commercial Sales Manager With Maria Loughrey

Rapid7 Blog

7 Rapid Questions: Growing From BDR to Commercial Sales Manager With Maria Loughrey

Rapid7's avatar

Rapid7

New US Law to Require Cyber Incident Reports

Industry Trends

New US Law to Require Cyber Incident Reports

Harley Geiger's avatar

Harley Geiger

CVE-2022-0847: Arbitrary File Overwrite Vulnerability in Linux Kernel

Vulnerabilities and Exploits

CVE-2022-0847: Arbitrary File Overwrite Vulnerability in Linux Kernel

Caitlin Condon's avatar

Caitlin Condon

3 Reasons to Join Rapid7’s Cloud Security Summit

Cloud and Devops Security

3 Reasons to Join Rapid7’s Cloud Security Summit

Ben Austin's avatar

Ben Austin

Patch Tuesday - March 2022

Detection and Response

Patch Tuesday - March 2022

Greg Wiseman's avatar

Greg Wiseman

InsightVM Scan Engine: Understanding MAC Address Discovery

Products and Tools

InsightVM Scan Engine: Understanding MAC Address Discovery

Emmett Kelly's avatar

Emmett Kelly

Metasploit Weekly Wrap-Up: Mar. 4, 2022

Vulnerabilities and Exploits

Metasploit Weekly Wrap-Up: Mar. 4, 2022

Shelby Pace's avatar

Shelby Pace

Graph Analysis of the Conti Ransomware Group Internal Chats

Detection and Response

Graph Analysis of the Conti Ransomware Group Internal Chats

Rapid7's avatar

Rapid7

Russia-Ukraine Cybersecurity Updates

Threat Research

Russia-Ukraine Cybersecurity Updates

Rapid7's avatar

Rapid7

The Top 5 Russian Cyber Threat Actors to Watch

Threat Research

The Top 5 Russian Cyber Threat Actors to Watch

Rapid7's avatar

Rapid7

CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)

Threat Research

CVE-2021-4191: GitLab GraphQL API User Enumeration (FIXED)

Jake Baines's avatar

Jake Baines

InsightAppSec GitHub Integration Keeps Risky Code From Reaching Production

Products and Tools

InsightAppSec GitHub Integration Keeps Risky Code From Reaching Production

Nate Crampton's avatar

Nate Crampton

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Threat Research

Conti Ransomware Group Internal Chats Leaked Over Russia-Ukraine Conflict

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up: 2/25/22

Exposure Management

Metasploit Weekly Wrap-Up: 2/25/22

Spencer McIntyre's avatar

Spencer McIntyre

Russia/Ukraine Conflict: What Is Rapid7 Doing to Protect My Organization?

Vulnerabilities and Exploits

Russia/Ukraine Conflict: What Is Rapid7 Doing to Protect My Organization?

Rapid7's avatar

Rapid7

Staying Secure in a Global Cyber Conflict

Vulnerabilities and Exploits

Staying Secure in a Global Cyber Conflict

Rapid7's avatar

Rapid7

Demystifying XDR: How Curated Detections Filter Out the Noise

Products and Tools

Demystifying XDR: How Curated Detections Filter Out the Noise

Jesse Mack's avatar

Jesse Mack

For Health Insurance Companies, Web Apps Can Be an Open Wound

Threat Research

For Health Insurance Companies, Web Apps Can Be an Open Wound

Paul Prudhomme's avatar

Paul Prudhomme