The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
3612 Results

Products and Tools
Why Security in Kubernetes Isn't the Same as in Linux: Part 1
Sagi Rosenthal

Industry Trends
How Ransomware Is Changing US Federal Policy
Harley Geiger

Security Operations
The Great Resignation: 4 Ways Cybersecurity Can Win
Amy Hunt

Exposure Management
Metasploit Weekly Wrap-Up: 1/21/22
Brendan Watters

Threat Research
Is the Internet of Things the Next Ransomware Target?
Deral Heiland

Threat Research
Open-Source Security: Getting to the Root of the Problem
Matthew Kienow

Vulnerabilities and Exploits
Active Exploitation of VMware Horizon Servers
Glenn Thorpe

Security Operations
Metrics That Matter and Curtailing the Cobra Effect
Curt Barnard

Products and Tools
Metasploit Weekly Wrap-Up: 1/14/22
Simon Janusz

Rapid7 Blog
7 Rapid Questions: Stephen Donnelly
Rapid7

Threat Research
Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List
Erick Galinkin

Detection and Response
Evaluating MDR Vendors: A Pocket Buyer's Guide
Mikayla Wyman

Threat Research
A Quick Look at CES 2022
Deral Heiland

Products and Tools
A December to Remember — Or, How We Improved InsightAppSec in Q4 in the Midst of Log4Shell
Tom Caiazza

Detection and Response
Demystifying XDR: How Humans and Machines Join Forces in Threat Response
Jesse Mack

Exposure Management
Patch Tuesday - January 2022
Greg Wiseman

Exposure Management
CVE-2021-20038..42: SonicWall SMA 100 Multiple Vulnerabilities (FIXED)
Jake Baines

Industry Trends
The 2021 Naughty and Nice Lists: Cybersecurity Edition
Jesse Mack

Exposure Management
Log4Shell Strategic Response: 5 Practices for Vulnerability Management at Scale
Steve Divine

Exposure Management
Metasploit Wrap-Up: Jan. 7, 2022
Erran Carey

Threat Research
What's New in Threat Intelligence: 2021 Year in Review
Stacy Moran