The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrap-Up: Feb. 11, 2022

Threat Research

Metasploit Wrap-Up: Feb. 11, 2022

Christophe De La Fuente's avatar

Christophe De La Fuente

The Forecast Is Flipped: How Rapid7 Is Flipping L&D for the Future of Work

Rapid7 Blog

The Forecast Is Flipped: How Rapid7 Is Flipping L&D for the Future of Work

Megan Yawor's avatar

Megan Yawor

Evolving How We Share Rapid7 Research Data

Products and Tools

Evolving How We Share Rapid7 Research Data

Rapid7's avatar

Rapid7

Patch Tuesday - February 2022

Detection and Response

Patch Tuesday - February 2022

Greg Wiseman's avatar

Greg Wiseman

The Big Target on Cyber Insurers' Backs

Threat Research

The Big Target on Cyber Insurers' Backs

Paul Prudhomme's avatar

Paul Prudhomme

Why Security in Kubernetes Isn't the Same as in Linux: Part 2

Products and Tools

Why Security in Kubernetes Isn't the Same as in Linux: Part 2

Sagi Rosenthal's avatar

Sagi Rosenthal

Metasploit Wrap-Up: Feb. 4, 2022

Exposure Management

Metasploit Wrap-Up: Feb. 4, 2022

Grant Willcox's avatar

Grant Willcox

7 Rapid Questions With Our APAC Sales Manager, Soumi

Rapid7 Blog

7 Rapid Questions With Our APAC Sales Manager, Soumi

Rapid7's avatar

Rapid7

Velociraptor Version 0.6.3: Dig Deeper With More Speed and Scalability

Products and Tools

Velociraptor Version 0.6.3: Dig Deeper With More Speed and Scalability

Carlos Canto's avatar

Carlos Canto

Demystifying XDR: Where SIEM and XDR Collide

Detection and Response

Demystifying XDR: Where SIEM and XDR Collide

Jesse Mack's avatar

Jesse Mack

2021 Cybersecurity Superlatives: An InsightIDR Year in Review

Security Operations

2021 Cybersecurity Superlatives: An InsightIDR Year in Review

KJ McCann's avatar

KJ McCann

Metasploit Weekly Wrap-Up: Jan. 28, 2022

Exposure Management

Metasploit Weekly Wrap-Up: Jan. 28, 2022

Dean Welch's avatar

Dean Welch

Why Security in Kubernetes Isn't the Same as in Linux: Part 1

Products and Tools

Why Security in Kubernetes Isn't the Same as in Linux: Part 1

Sagi Rosenthal's avatar

Sagi Rosenthal

How Ransomware Is Changing US Federal Policy

Industry Trends

How Ransomware Is Changing US Federal Policy

Harley Geiger's avatar

Harley Geiger

The Great Resignation: 4 Ways Cybersecurity Can Win

Security Operations

The Great Resignation: 4 Ways Cybersecurity Can Win

Amy Hunt's avatar

Amy Hunt

Metasploit Weekly Wrap-Up:  1/21/22

Exposure Management

Metasploit Weekly Wrap-Up: 1/21/22

Brendan Watters's avatar

Brendan Watters

Is the Internet of Things the Next Ransomware Target?

Threat Research

Is the Internet of Things the Next Ransomware Target?

Deral Heiland's avatar

Deral Heiland

Open-Source Security: Getting to the Root of the Problem

Threat Research

Open-Source Security: Getting to the Root of the Problem

Matthew Kienow's avatar

Matthew Kienow

Active Exploitation of VMware Horizon Servers

Vulnerabilities and Exploits

Active Exploitation of VMware Horizon Servers

Glenn Thorpe's avatar

Glenn Thorpe

Metrics That Matter and Curtailing the Cobra Effect

Security Operations

Metrics That Matter and Curtailing the Cobra Effect

Curt Barnard's avatar

Curt Barnard

Metasploit Weekly Wrap-Up: 1/14/22

Products and Tools

Metasploit Weekly Wrap-Up: 1/14/22

Simon Janusz's avatar

Simon Janusz