The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Demystifying XDR: A Forrester Analyst Lays the Foundation

Products and Tools

Demystifying XDR: A Forrester Analyst Lays the Foundation

Jesse Mack's avatar

Jesse Mack

Oh No, Zoho: Active Exploitation of CVE-2021-44077 Allowing Unauthenticated Remote Code Execution

Exposure Management

Oh No, Zoho: Active Exploitation of CVE-2021-44077 Allowing Unauthenticated Remote Code Execution

Glenn Thorpe's avatar

Glenn Thorpe

3 Strategies That Are More Productive Than Hack Back

Detection and Response

3 Strategies That Are More Productive Than Hack Back

boB Rudis's avatar

boB Rudis

Congrats to the Winners of the 2021 Metasploit Community CTF

Products and Tools

Congrats to the Winners of the 2021 Metasploit Community CTF

Spencer McIntyre's avatar

Spencer McIntyre

Kubernetes Guardrails: Bringing DevOps and Security Together on Cloud

Products and Tools

Kubernetes Guardrails: Bringing DevOps and Security Together on Cloud

Alon Berger's avatar

Alon Berger

Deepfakes: A Nascent Cybersecurity Threat

Exposure Management

Deepfakes: A Nascent Cybersecurity Threat

Yotam Katz's avatar

Yotam Katz

InsightCloudSec Supports 12 New AWS Services Announced at re:Invent

Products and Tools

InsightCloudSec Supports 12 New AWS Services Announced at re:Invent

Chris DeRamus's avatar

Chris DeRamus

Metasploit Wrap-Up: 12/3/21

Threat Research

Metasploit Wrap-Up: 12/3/21

Spencer McIntyre's avatar

Spencer McIntyre

Hacky Holidays From Rapid7! Announcing Our New Festive Blog Series

Rapid7 Blog

Hacky Holidays From Rapid7! Announcing Our New Festive Blog Series

Jesse Mack's avatar

Jesse Mack

OWASP Top 10 Deep Dive: Identification and Authentication Failures

Cloud and Devops Security

OWASP Top 10 Deep Dive: Identification and Authentication Failures

Nathaniel Hierseman's avatar

Nathaniel Hierseman

Ongoing Exploitation of Windows Installer CVE-2021-41379

Exposure Management

Ongoing Exploitation of Windows Installer CVE-2021-41379

Glenn Thorpe's avatar

Glenn Thorpe

Active Exploitation of Apache HTTP Server CVE-2021-40438

Exposure Management

Active Exploitation of Apache HTTP Server CVE-2021-40438

Caitlin Condon's avatar

Caitlin Condon

Metasploit Wrap-Up: Nov. 26 2021

Threat Research

Metasploit Wrap-Up: Nov. 26 2021

Christophe De La Fuente's avatar

Christophe De La Fuente

OWASP Top 10 Deep Dive: Defending Against Server-Side Request Forgery

Cloud and Devops Security

OWASP Top 10 Deep Dive: Defending Against Server-Side Request Forgery

Neville O'Neill's avatar

Neville O'Neill

Is it the End of the Cybersecurity Skills Gap Crisis Yet?

Security Operations

Is it the End of the Cybersecurity Skills Gap Crisis Yet?

Amy Hunt's avatar

Amy Hunt

Metasploit Wrap-Up: 11/19/21

Threat Research

Metasploit Wrap-Up: 11/19/21

Erin Bleiweiss's avatar

Erin Bleiweiss

A First-Year CISO Shares Her Point of View

Security Operations

A First-Year CISO Shares Her Point of View

Jesse Mack's avatar

Jesse Mack

Make Room for Cloud Security in Your 2022 Budget

Products and Tools

Make Room for Cloud Security in Your 2022 Budget

Shelby Matthews's avatar

Shelby Matthews

Distribute Reports to Email Addresses in InsightVM

Exposure Management

Distribute Reports to Email Addresses in InsightVM

Dane Grace's avatar

Dane Grace

2022 Planning: Prioritizing Defense and Mitigation Through Left of Boom

Security Operations

2022 Planning: Prioritizing Defense and Mitigation Through Left of Boom

boB Rudis's avatar

boB Rudis

Announcing the 2021 Metasploit Community CTF

Products and Tools

Announcing the 2021 Metasploit Community CTF

Caitlin Condon's avatar

Caitlin Condon