The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrap-Up 09/12/25

Products and Tools

Metasploit Wrap-Up 09/12/25

Jack Heysel's avatar

Jack Heysel

Rapid7 Q2 2025 Incident Response Findings

Detection and Response

Rapid7 Q2 2025 Incident Response Findings

Chris Boyd's avatar

Chris Boyd

Akira Ransomware Group Utilizing SonicWall Devices for Initial Access

Detection and Response

Akira Ransomware Group Utilizing SonicWall Devices for Initial Access

Rapid7's avatar

Rapid7

ANY.RUN and Rapid7 Threat Feed Integration

Products and Tools

ANY.RUN and Rapid7 Threat Feed Integration

Rapid7's avatar

Rapid7

Patch Tuesday - September 2025

Exposure Management

Patch Tuesday - September 2025

Adam Barnett's avatar

Adam Barnett

Cybersecurity Awareness Month 2025: How AI Is Reshaping Phishing, Ransomware, and Everyday Security

Industry Trends

Cybersecurity Awareness Month 2025: How AI Is Reshaping Phishing, Ransomware, and Everyday Security

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 09/05/2025

Products and Tools

Metasploit Weekly Wrap-Up 09/05/2025

Simon Janusz's avatar

Simon Janusz

InsightAppSec: Time-based One-Time Passwords, MFA Automation Using Macros

Products and Tools

InsightAppSec: Time-based One-Time Passwords, MFA Automation Using Macros

Shane Queeney's avatar

Shane Queeney

Safeguarding Salesforce: What You Need to Know About the OAuth Token Compromise

Detection and Response

Safeguarding Salesforce: What You Need to Know About the OAuth Token Compromise

Rapid7's avatar

Rapid7

New Infographic Showcases How Rapid7 MDR Stops Threats Fast

Detection and Response

New Infographic Showcases How Rapid7 MDR Stops Threats Fast

Rapid7's avatar

Rapid7

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 2)

Threat Research

An Earth-Shattering Kaboom: Bringing a Physical ICS Penetration Testing Environment to Life (Part 2)

Anna Katarina Quinn's avatar

Anna Katarina Quinn

Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise

Vulnerabilities and Exploits

Flashrom to Hexedit to Root: DEF CON 33 IoT Village Exercise

Rapid7's avatar

Rapid7

Metasploit Weekly Wrap-Up 08/28/2025

Products and Tools

Metasploit Weekly Wrap-Up 08/28/2025

Alan David Foster's avatar

Alan David Foster

Rapid7 Named a Leader in the 2025 IDC MarketScape for Exposure Management

Exposure Management

Rapid7 Named a Leader in the 2025 IDC MarketScape for Exposure Management

Rapid7's avatar

Rapid7

CVE-2025-7775: Critical NetScaler vulnerability exploited in-the-wild

Vulnerabilities and Exploits

CVE-2025-7775: Critical NetScaler vulnerability exploited in-the-wild

Stephen Fewer's avatar

Stephen Fewer

Three Ways Gartner® Says Exposure Management Is Reshaping SecOps

Exposure Management

Three Ways Gartner® Says Exposure Management Is Reshaping SecOps

Rapid7's avatar

Rapid7

What Happens When Agentic AIs Talk to Each Other?

Industry Trends

What Happens When Agentic AIs Talk to Each Other?

Rapid7's avatar

Rapid7

Securden Unified PAM: Multiple Critical Vulnerabilities (FIXED)

Vulnerabilities and Exploits

Securden Unified PAM: Multiple Critical Vulnerabilities (FIXED)

Aaron Herndon's avatar
Marcus Chang's avatar

Aaron Herndon, Marcus Chang

Metasploit Weekly Wrap-Up 08/22/2025

Products and Tools

Metasploit Weekly Wrap-Up 08/22/2025

Brendan Watters's avatar

Brendan Watters

Rapid7 named a representative vendor in 2025 Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)

Cloud and Devops Security

Rapid7 named a representative vendor in 2025 Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)

Joel Alcon's avatar

Joel Alcon

From Perimeter to Core: Vector Command Advanced Expands Red Team Coverage

Products and Tools

From Perimeter to Core: Vector Command Advanced Expands Red Team Coverage

Ed Montgomery's avatar

Ed Montgomery