The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Akkadian Provisioning Manager Multiple Vulnerabilities Disclosure (Fixed)

Threat Research

Akkadian Provisioning Manager Multiple Vulnerabilities Disclosure (Fixed)

Tod Beardsley's avatar

Tod Beardsley

Patch Tuesday - June 2021

Detection and Response

Patch Tuesday - June 2021

Adam Bunn's avatar

Adam Bunn

Start putting automation into practice.

Exposure Management

Start putting automation into practice.

Aaron Wells's avatar

Aaron Wells

Kill Chains: Part 2→Strategic and tactical use cases

Detection and Response

Kill Chains: Part 2→Strategic and tactical use cases

Jeffrey Gardner's avatar

Jeffrey Gardner

Metasploit Wrap-Up: 6/4/21

Products and Tools

Metasploit Wrap-Up: 6/4/21

Louis Sato's avatar

Louis Sato

All about the boundaries: The cloud IAM lifecycle approach

Security Operations

All about the boundaries: The cloud IAM lifecycle approach

Rapid7's avatar

Rapid7

Proposed security researcher protection under CFAA

Industry Trends

Proposed security researcher protection under CFAA

Harley Geiger's avatar

Harley Geiger

Supreme Court narrows CFAA

Industry Trends

Supreme Court narrows CFAA

Harley Geiger's avatar

Harley Geiger

CVE-2021-3198 and CVE-2021-3540: MobileIron Shell Escape Privilege Escalation Vulnerabilities

Threat Research

CVE-2021-3198 and CVE-2021-3540: MobileIron Shell Escape Privilege Escalation Vulnerabilities

Tod Beardsley's avatar

Tod Beardsley

Rapid7 Named a Visionary in 2021 Gartner Magic Quadrant for Application Security Testing

Products and Tools

Rapid7 Named a Visionary in 2021 Gartner Magic Quadrant for Application Security Testing

Bria Grangard's avatar

Bria Grangard

Creating coefficiency: DevOps, Security, and Compliance

Products and Tools

Creating coefficiency: DevOps, Security, and Compliance

Aaron Wells's avatar

Aaron Wells

How the Biden Administration's cybersecurity order will affect companies

Industry Trends

How the Biden Administration's cybersecurity order will affect companies

Harley Geiger's avatar

Harley Geiger

Metasploit Wrap-Up: May 28, 2021

Exposure Management

Metasploit Wrap-Up: May 28, 2021

Alan David Foster's avatar

Alan David Foster

5 questions to answer before spending big on cloud security

Products and Tools

5 questions to answer before spending big on cloud security

Aaron Wells's avatar

Aaron Wells

Kill Chains: Part 1→Strategic and operational value

Security Operations

Kill Chains: Part 1→Strategic and operational value

Jeffrey Gardner's avatar

Jeffrey Gardner

CVE-2021-21985: What You Need To Know About the Latest Critical vCenter Server Vulnerability

Exposure Management

CVE-2021-21985: What You Need To Know About the Latest Critical vCenter Server Vulnerability

Caitlin Condon's avatar

Caitlin Condon

Reducing Risk With Identity Access Management (IAM)

Security Operations

Reducing Risk With Identity Access Management (IAM)

Rapid7's avatar

Rapid7

Metasploit Wrap-Up: 5/21/21

Exposure Management

Metasploit Wrap-Up: 5/21/21

Sonny Gonzalez's avatar

Sonny Gonzalez

Want to stay ahead of emerging threats? Here’s how.

Detection and Response

Want to stay ahead of emerging threats? Here’s how.

Aaron Wells's avatar

Aaron Wells

Rapid7's 2021 ICER Takeaways: Vulnerability Disclosure Programs Among the Fortune 500

Threat Research

Rapid7's 2021 ICER Takeaways: Vulnerability Disclosure Programs Among the Fortune 500

Tod Beardsley's avatar

Tod Beardsley

Calling for cybersecurity in infrastructure modernization

Industry Trends

Calling for cybersecurity in infrastructure modernization

Harley Geiger's avatar

Harley Geiger