The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Why Security in Kubernetes Isn't the Same as in Linux: Part 1

Products and Tools

Why Security in Kubernetes Isn't the Same as in Linux: Part 1

Sagi Rosenthal's avatar

Sagi Rosenthal

How Ransomware Is Changing US Federal Policy

Industry Trends

How Ransomware Is Changing US Federal Policy

Harley Geiger's avatar

Harley Geiger

The Great Resignation: 4 Ways Cybersecurity Can Win

Security Operations

The Great Resignation: 4 Ways Cybersecurity Can Win

Amy Hunt's avatar

Amy Hunt

Metasploit Weekly Wrap-Up:  1/21/22

Exposure Management

Metasploit Weekly Wrap-Up: 1/21/22

Brendan Watters's avatar

Brendan Watters

Is the Internet of Things the Next Ransomware Target?

Threat Research

Is the Internet of Things the Next Ransomware Target?

Deral Heiland's avatar

Deral Heiland

Open-Source Security: Getting to the Root of the Problem

Threat Research

Open-Source Security: Getting to the Root of the Problem

Matthew Kienow's avatar

Matthew Kienow

Active Exploitation of VMware Horizon Servers

Vulnerabilities and Exploits

Active Exploitation of VMware Horizon Servers

Glenn Thorpe's avatar

Glenn Thorpe

Metrics That Matter and Curtailing the Cobra Effect

Security Operations

Metrics That Matter and Curtailing the Cobra Effect

Curt Barnard's avatar

Curt Barnard

Metasploit Weekly Wrap-Up: 1/14/22

Products and Tools

Metasploit Weekly Wrap-Up: 1/14/22

Simon Janusz's avatar

Simon Janusz

7 Rapid Questions: Stephen Donnelly

Rapid7 Blog

7 Rapid Questions: Stephen Donnelly

Rapid7's avatar

Rapid7

Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List

Threat Research

Being Naughty to See Who Was Nice: Machine Learning Attacks on Santa’s List

Erick Galinkin's avatar

Erick Galinkin

Evaluating MDR Vendors: A Pocket Buyer's Guide

Detection and Response

Evaluating MDR Vendors: A Pocket Buyer's Guide

Mikayla Wyman's avatar

Mikayla Wyman

A Quick Look at CES 2022

Threat Research

A Quick Look at CES 2022

Deral Heiland's avatar

Deral Heiland

A December to Remember — Or, How We Improved InsightAppSec in Q4 in the Midst of Log4Shell

Products and Tools

A December to Remember — Or, How We Improved InsightAppSec in Q4 in the Midst of Log4Shell

Tom Caiazza's avatar

Tom Caiazza

Demystifying XDR: How Humans and Machines Join Forces in Threat Response

Detection and Response

Demystifying XDR: How Humans and Machines Join Forces in Threat Response

Jesse Mack's avatar

Jesse Mack

Patch Tuesday - January 2022

Exposure Management

Patch Tuesday - January 2022

Greg Wiseman's avatar

Greg Wiseman

CVE-2021-20038..42: SonicWall SMA 100 Multiple Vulnerabilities (FIXED)

Exposure Management

CVE-2021-20038..42: SonicWall SMA 100 Multiple Vulnerabilities (FIXED)

Jake Baines's avatar

Jake Baines

The 2021 Naughty and Nice Lists: Cybersecurity Edition

Industry Trends

The 2021 Naughty and Nice Lists: Cybersecurity Edition

Jesse Mack's avatar

Jesse Mack

Log4Shell Strategic Response: 5 Practices for Vulnerability Management at Scale

Exposure Management

Log4Shell Strategic Response: 5 Practices for Vulnerability Management at Scale

Steve Divine's avatar

Steve Divine

Metasploit Wrap-Up: Jan. 7, 2022

Exposure Management

Metasploit Wrap-Up: Jan. 7, 2022

Erran Carey's avatar

Erran Carey

What's New in Threat Intelligence: 2021 Year in Review

Threat Research

What's New in Threat Intelligence: 2021 Year in Review

Stacy Moran's avatar

Stacy Moran