The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

3 Security Regulations Automotive Companies Need to Know

Threat Research

3 Security Regulations Automotive Companies Need to Know

Chris Strand's avatar

Chris Strand

How to Gain Visibility Into Audit Logs for Policy Customization in InsightVM

Exposure Management

How to Gain Visibility Into Audit Logs for Policy Customization in InsightVM

Naveen Bibinagar's avatar

Naveen Bibinagar

Happy HaXmas from the Rapid7 Team!

Exposure Management

Happy HaXmas from the Rapid7 Team!

Bri Hand's avatar

Bri Hand

The Risky Business: Rapid7 Report Highlights Need for Improved Vulnerability Management Practices

Products and Tools

The Risky Business: Rapid7 Report Highlights Need for Improved Vulnerability Management Practices

Aaron Wells's avatar

Aaron Wells

SolarWinds SUNBURST Backdoor Supply Chain Attack: What You Need to Know

Vulnerabilities and Exploits

SolarWinds SUNBURST Backdoor Supply Chain Attack: What You Need to Know

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up: 12/11/20

Exposure Management

Metasploit Wrap-Up: 12/11/20

Spencer McIntyre's avatar

Spencer McIntyre

NICER Protocol Deep Dive: Internet Exposure of etcd

Exposure Management

NICER Protocol Deep Dive: Internet Exposure of etcd

Tod Beardsley's avatar

Tod Beardsley

New All Apps and Asset Report Combines Power of InsightVM and InsightAppSec for Boosted Visibility

Exposure Management

New All Apps and Asset Report Combines Power of InsightVM and InsightAppSec for Boosted Visibility

Bria Grangard's avatar

Bria Grangard

2020 Under the Hoodie Report Reveals Pen Testers’ Most-Loved Vulnerabilities

Products and Tools

2020 Under the Hoodie Report Reveals Pen Testers’ Most-Loved Vulnerabilities

Rapid7's avatar

Rapid7

Congrats to the Winners of the 2020 December Metasploit Community CTF

Products and Tools

Congrats to the Winners of the 2020 December Metasploit Community CTF

Alan David Foster's avatar

Alan David Foster

NICER Protocol Deep Dive: Internet Exposure of memcached

Threat Research

NICER Protocol Deep Dive: Internet Exposure of memcached

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrap-Up: 12/4/20

Exposure Management

Metasploit Wrap-Up: 12/4/20

Brendan Watters's avatar

Brendan Watters

How to Create an OS-Based Policy Scanning Workflow in InsightVM

Exposure Management

How to Create an OS-Based Policy Scanning Workflow in InsightVM

Landon Dalke's avatar

Landon Dalke

Rapid7’s InsightIDR Introduces Integration with Cybereason

Products and Tools

Rapid7’s InsightIDR Introduces Integration with Cybereason

Margaret Wei's avatar

Margaret Wei

A Holistic Approach to Kubernetes Security and Compliance

Products and Tools

A Holistic Approach to Kubernetes Security and Compliance

Rapid7's avatar

Rapid7

Threat and Vulnerability Management Best Practices

Products and Tools

Threat and Vulnerability Management Best Practices

Tori Sitcawich's avatar

Tori Sitcawich

Rapid7 Recognized as a Strong Performer Among Security Analytics Providers by Leading Industry Report

Threat Research

Rapid7 Recognized as a Strong Performer Among Security Analytics Providers by Leading Industry Report

Meaghan Buchanan's avatar

Meaghan Buchanan

NICER Protocol Deep Dive: Internet Exposure of Redis

Exposure Management

NICER Protocol Deep Dive: Internet Exposure of Redis

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrap-Up 11/27/20

Exposure Management

Metasploit Wrap-Up 11/27/20

Christophe De La Fuente's avatar

Christophe De La Fuente

CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)

Vulnerabilities and Exploits

CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Don’t Let These Top Cloud Myths Hamper Your Business Decision-Making

Cloud and Devops Security

Don’t Let These Top Cloud Myths Hamper Your Business Decision-Making

Rapid7's avatar

Rapid7