The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
3613 Results

Vulnerabilities and Exploits
Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise
Rapid7

Products and Tools
Metasploit Weekly Wrap-Up 08/28/2025
Alan David Foster
Exposure Management
Rapid7 Named a Leader in the 2025 IDC MarketScape for Exposure Management
Rapid7

Vulnerabilities and Exploits
CVE-2025-7775: Critical NetScaler vulnerability exploited in-the-wild
Stephen Fewer

Exposure Management
Three Ways Gartner® Says Exposure Management Is Reshaping SecOps
Rapid7

Industry Trends
What Happens When Agentic AIs Talk to Each Other?
Rapid7

Vulnerabilities and Exploits
Securden Unified PAM: Multiple Critical Vulnerabilities (FIXED)
Aaron Herndon, Marcus Chang

Products and Tools
Metasploit Weekly Wrap-Up 08/22/2025
Brendan Watters

Cloud and Devops Security
Rapid7 named a representative vendor in 2025 Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)
Joel Alcon

Products and Tools
From Perimeter to Core: Vector Command Advanced Expands Red Team Coverage
Ed Montgomery

Detection and Response
What the First 24 Hours of a Cyberattack Can Teach You About MDR
Rapid7

Products and Tools
Metasploit Weekly Wrap-Up 08/15/2025
Marcin Walas

Products and Tools
Announcing Nmap 7.95 Upgrade and More Accurate Simple Network Management Protocol (SNMP) Fingerprinting
Conor McCormick

Detection and Response
What's New in the 2025 MDR Buyer’s Guide: Rapid7’s Fresh Take on Modern Detection and Response
Rapid7

Exposure Management
Patch Tuesday - August 2025
Adam Barnett

Threat Research
Compromise for Sale: Inside the Rapid7 2025 Access Brokers Report
Rapid7

Threat Research
DisguiseDelimit: Rapid7 talks NAS exploitation at DEF CON 33
Rapid7

Products and Tools
Metasploit Wrap-Up 08/08/25
Dean Welch

Products and Tools
What’s New in Rapid7 Products & Services: Q2 2025 in Review
Jamie Cowper

Threat Research
An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 1)
Anna Katarina Quinn

Products and Tools
Introducing: The Metasploit Pro AD CS Metamodule
Spencer McIntyre