The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Sharing the Gifts of Cybersecurity – Or, a Lesson From My First Year Without Santa

Security Operations

Sharing the Gifts of Cybersecurity – Or, a Lesson From My First Year Without Santa

Amy Hunt's avatar

Amy Hunt

Test for Log4Shell With InsightAppSec Using New Functionality

Products and Tools

Test for Log4Shell With InsightAppSec Using New Functionality

Bria Grangard's avatar

Bria Grangard

Metasploit Wrap-Up: Dec. 17, 2021

Exposure Management

Metasploit Wrap-Up: Dec. 17, 2021

Alan David Foster's avatar

Alan David Foster

The Everyperson’s Guide to Log4Shell (CVE-2021-44228)

Vulnerabilities and Exploits

The Everyperson’s Guide to Log4Shell (CVE-2021-44228)

boB Rudis's avatar

boB Rudis

How to Protect Your Applications Against Log4Shell With tCell

Products and Tools

How to Protect Your Applications Against Log4Shell With tCell

Bria Grangard's avatar

Bria Grangard

Patch Tuesday - December 2021

Detection and Response

Patch Tuesday - December 2021

Greg Wiseman's avatar

Greg Wiseman

Log4Shell Makes Its Appearance in Hacker Chatter: 4 Observations

Threat Research

Log4Shell Makes Its Appearance in Hacker Chatter: 4 Observations

Alon Arvatz's avatar

Alon Arvatz

Using InsightVM to Find Apache Log4j CVE-2021-44228

Vulnerabilities and Exploits

Using InsightVM to Find Apache Log4j CVE-2021-44228

Greg Wiseman's avatar

Greg Wiseman

Update on Log4Shell’s Impact on Rapid7 Solutions and Systems

Exposure Management

Update on Log4Shell’s Impact on Rapid7 Solutions and Systems

Rapid7's avatar

Rapid7

Driver-Based Attacks: Past and Present

Vulnerabilities and Exploits

Driver-Based Attacks: Past and Present

Jake Baines's avatar

Jake Baines

Metasploit Wrap-Up 12/10/21

Threat Research

Metasploit Wrap-Up 12/10/21

Jeffrey Martin's avatar

Jeffrey Martin

Widespread Exploitation of Critical Remote Code Execution in Apache Log4j

Exposure Management

Widespread Exploitation of Critical Remote Code Execution in Apache Log4j

boB Rudis's avatar

boB Rudis

Stay Ahead of Threats With Cloud Workload Protection

Products and Tools

Stay Ahead of Threats With Cloud Workload Protection

Alon Berger's avatar

Alon Berger

Simplifying Complex Cybersecurity Regulations

Industry Trends

Simplifying Complex Cybersecurity Regulations

Harley Geiger's avatar

Harley Geiger

A Dream Team-Up: Integrate InsightAppSec With ServiceNow ITSM

Products and Tools

A Dream Team-Up: Integrate InsightAppSec With ServiceNow ITSM

Tom Caiazza's avatar

Tom Caiazza

Patch Now: SonicWall Fixes Multiple Vulnerabilities in SMA 100 Devices

Exposure Management

Patch Now: SonicWall Fixes Multiple Vulnerabilities in SMA 100 Devices

Glenn Thorpe's avatar

Glenn Thorpe

Demystifying XDR: A Forrester Analyst Lays the Foundation

Products and Tools

Demystifying XDR: A Forrester Analyst Lays the Foundation

Jesse Mack's avatar

Jesse Mack

Oh No, Zoho: Active Exploitation of CVE-2021-44077 Allowing Unauthenticated Remote Code Execution

Exposure Management

Oh No, Zoho: Active Exploitation of CVE-2021-44077 Allowing Unauthenticated Remote Code Execution

Glenn Thorpe's avatar

Glenn Thorpe

3 Strategies That Are More Productive Than Hack Back

Detection and Response

3 Strategies That Are More Productive Than Hack Back

boB Rudis's avatar

boB Rudis

Congrats to the Winners of the 2021 Metasploit Community CTF

Products and Tools

Congrats to the Winners of the 2021 Metasploit Community CTF

Spencer McIntyre's avatar

Spencer McIntyre

Kubernetes Guardrails: Bringing DevOps and Security Together on Cloud

Products and Tools

Kubernetes Guardrails: Bringing DevOps and Security Together on Cloud

Alon Berger's avatar

Alon Berger