The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

What's New in Threat Intelligence: 2021 Year in Review

Threat Research

What's New in Threat Intelligence: 2021 Year in Review

Stacy Moran's avatar

Stacy Moran

Log4Shell Makes Its Appearance in Hacker Chatter: 4 Observations

Threat Research

Log4Shell Makes Its Appearance in Hacker Chatter: 4 Observations

Alon Arvatz's avatar

Alon Arvatz

Metasploit Wrap-Up 12/10/21

Threat Research

Metasploit Wrap-Up 12/10/21

Jeffrey Martin's avatar

Jeffrey Martin

Metasploit Wrap-Up: 12/3/21

Threat Research

Metasploit Wrap-Up: 12/3/21

Spencer McIntyre's avatar

Spencer McIntyre

Metasploit Wrap-Up: Nov. 26 2021

Threat Research

Metasploit Wrap-Up: Nov. 26 2021

Christophe De La Fuente's avatar

Christophe De La Fuente

Metasploit Wrap-Up: 11/19/21

Threat Research

Metasploit Wrap-Up: 11/19/21

Erin Bleiweiss's avatar

Erin Bleiweiss

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 4

Threat Research

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 4

Deral Heiland's avatar

Deral Heiland

Time to Act: Bridging the Gap in Cloud Automation Adoption

Threat Research

Time to Act: Bridging the Gap in Cloud Automation Adoption

Erica Azad's avatar

Erica Azad

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 3

Threat Research

Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 3

Deral Heiland's avatar

Deral Heiland

Infostealer Malware Masquerades as Windows Application

Threat Research

Infostealer Malware Masquerades as Windows Application

Andrew Iwamaye's avatar

Andrew Iwamaye

SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal

Threat Research

SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal

Margaret Wei's avatar

Margaret Wei

Metasploit Wrap-Up: 9/10/21

Threat Research

Metasploit Wrap-Up: 9/10/21

Louis Sato's avatar

Louis Sato

Cloud Challenges in the Age of Remote Work: Rapid7’s 2021 Cloud Misconfigurations Report

Threat Research

Cloud Challenges in the Age of Remote Work: Rapid7’s 2021 Cloud Misconfigurations Report

Shelby Matthews's avatar

Shelby Matthews

SANS Experts: 4 Emerging Enterprise Attack Techniques

Threat Research

SANS Experts: 4 Emerging Enterprise Attack Techniques

Aaron Wells's avatar

Aaron Wells

[R]Evolution of the Cyber Threat Intelligence Practice

Threat Research

[R]Evolution of the Cyber Threat Intelligence Practice

Alon Arvatz's avatar

Alon Arvatz

Metasploit Wrap-Up 8/6/21

Threat Research

Metasploit Wrap-Up 8/6/21

Matthew Kienow's avatar

Matthew Kienow

Metasploit Wrap-Up: 7/23/2021

Threat Research

Metasploit Wrap-Up: 7/23/2021

Grant Willcox's avatar

Grant Willcox

[The Lost Bots] Episode 1: External Threat Intelligence

Threat Research

[The Lost Bots] Episode 1: External Threat Intelligence

Rapid7's avatar

Rapid7

Yes, Fraudsters Can Bypass the Strong Customer Authentication (SCA) Requirement

Threat Research

Yes, Fraudsters Can Bypass the Strong Customer Authentication (SCA) Requirement

Chris Strand's avatar

Chris Strand

Rapid7 Releases New Industry Cyber-Exposure Report (ICER): Deutsche Börse Prime Standard

Threat Research

Rapid7 Releases New Industry Cyber-Exposure Report (ICER): Deutsche Börse Prime Standard

Tod Beardsley's avatar

Tod Beardsley

Akkadian Provisioning Manager Multiple Vulnerabilities Disclosure (Fixed)

Threat Research

Akkadian Provisioning Manager Multiple Vulnerabilities Disclosure (Fixed)

Tod Beardsley's avatar

Tod Beardsley