The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
245 Results

Threat Research
What's New in Threat Intelligence: 2021 Year in Review
Stacy Moran

Threat Research
Log4Shell Makes Its Appearance in Hacker Chatter: 4 Observations
Alon Arvatz

Threat Research
Metasploit Wrap-Up 12/10/21
Jeffrey Martin

Threat Research
Metasploit Wrap-Up: 12/3/21
Spencer McIntyre

Threat Research
Metasploit Wrap-Up: Nov. 26 2021
Christophe De La Fuente

Threat Research
Metasploit Wrap-Up: 11/19/21
Erin Bleiweiss

Threat Research
Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 4
Deral Heiland

Threat Research
Time to Act: Bridging the Gap in Cloud Automation Adoption
Erica Azad

Threat Research
Hands-On IoT Hacking: Rapid7 at DefCon 29 IoT Village, Part 3
Deral Heiland

Threat Research
Infostealer Malware Masquerades as Windows Application
Andrew Iwamaye

Threat Research
SANS 2021 Threat Hunting Survey: How Organizations' Security Postures Have Evolved in the New Normal
Margaret Wei

Threat Research
Metasploit Wrap-Up: 9/10/21
Louis Sato

Threat Research
Cloud Challenges in the Age of Remote Work: Rapid7’s 2021 Cloud Misconfigurations Report
Shelby Matthews

Threat Research
SANS Experts: 4 Emerging Enterprise Attack Techniques
Aaron Wells
![[R]Evolution of the Cyber Threat Intelligence Practice](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblt592172d301c58fbb%2F683ddd9aff6aa96fdc0ea772%2Fevolution-threat-intelligence.jpg%3Fauto%3Davif&w=1920&q=75)
Threat Research
[R]Evolution of the Cyber Threat Intelligence Practice
Alon Arvatz

Threat Research
Metasploit Wrap-Up 8/6/21
Matthew Kienow

Threat Research
Metasploit Wrap-Up: 7/23/2021
Grant Willcox
![[The Lost Bots] Episode 1: External Threat Intelligence](/_next/image/?url=https%3A%2F%2Fimages.contentstack.io%2Fv3%2Fassets%2Fblte4f029e766e6b253%2Fblt82cd5c06bb93678c%2F683ddbdc3e68ee73768897fa%2F-The-Lost-Bots--Episode-1--External-Threat-Intelligence.png%3Fauto%3Davif&w=1920&q=75)
Threat Research
[The Lost Bots] Episode 1: External Threat Intelligence
Rapid7

Threat Research
Yes, Fraudsters Can Bypass the Strong Customer Authentication (SCA) Requirement
Chris Strand

Threat Research
Rapid7 Releases New Industry Cyber-Exposure Report (ICER): Deutsche Börse Prime Standard
Tod Beardsley

Threat Research
Akkadian Provisioning Manager Multiple Vulnerabilities Disclosure (Fixed)
Tod Beardsley