The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Easily Explore Your Log Data with a Single Query in InsightIDR

Detection and Response

Easily Explore Your Log Data with a Single Query in InsightIDR

Eoin Shanley's avatar

Eoin Shanley

Ransomware Payments and Sanctions - U.S. Treasury Advisory

Industry Trends

Ransomware Payments and Sanctions - U.S. Treasury Advisory

Harley Geiger's avatar

Harley Geiger

Why Every Organization Needs a Vulnerability Management Policy

Products and Tools

Why Every Organization Needs a Vulnerability Management Policy

Tori Sitcawich's avatar

Tori Sitcawich

Metasploit Wrap-Up: Oct. 2, 2020

Exposure Management

Metasploit Wrap-Up: Oct. 2, 2020

Louis Sato's avatar

Louis Sato

HP Device Manager Cavalcade of Critical CVEs (CVE-2020-6925:6927): What You Need to Know

Vulnerabilities and Exploits

HP Device Manager Cavalcade of Critical CVEs (CVE-2020-6925:6927): What You Need to Know

boB Rudis's avatar

boB Rudis

NICER Protocol Deep Dive: Internet Exposure of SMTP

Threat Research

NICER Protocol Deep Dive: Internet Exposure of SMTP

Tod Beardsley's avatar

Tod Beardsley

This One Time on a Pen Test: I Know...Everything

Threat Research

This One Time on a Pen Test: I Know...Everything

Shane Young's avatar

Shane Young

Rapid7 Introduces “Active Response” for End-to-End Detection and Response

Products and Tools

Rapid7 Introduces “Active Response” for End-to-End Detection and Response

Jake Godgart's avatar

Jake Godgart

Exploitability Analysis: Smash the Ref Bug Class

Threat Research

Exploitability Analysis: Smash the Ref Bug Class

Spencer McIntyre's avatar

Spencer McIntyre

Microsoft Exchange 2010 End of Support and Overall Patching Study

Exposure Management

Microsoft Exchange 2010 End of Support and Overall Patching Study

Tom Sellers's avatar

Tom Sellers

2021 Detection and Response Planning, Part 1: Rapid7’s Jeffrey Gardner Breaks Down How CISOs Should Approach Security Planning for the New Year

Products and Tools

2021 Detection and Response Planning, Part 1: Rapid7’s Jeffrey Gardner Breaks Down How CISOs Should Approach Security Planning for the New Year

Meaghan Buchanan's avatar

Meaghan Buchanan

Metasploit Wrap-up: 9/25/20

Products and Tools

Metasploit Wrap-up: 9/25/20

Brendan Watters's avatar

Brendan Watters

NICER Protocol Deep Dive: Internet Exposure of rsync

Threat Research

NICER Protocol Deep Dive: Internet Exposure of rsync

Tod Beardsley's avatar

Tod Beardsley

This One Time on a Pen Test: Ain’t No Fence High Enough

Threat Research

This One Time on a Pen Test: Ain’t No Fence High Enough

Leon Johnson's avatar

Leon Johnson

Rapid7 Releases Q2 2020 Quarterly Threat Report

Threat Research

Rapid7 Releases Q2 2020 Quarterly Threat Report

Wade Woolwine's avatar

Wade Woolwine

Define What to Parse From Logs with the Custom Parsing Tool in InsightIDR

Detection and Response

Define What to Parse From Logs with the Custom Parsing Tool in InsightIDR

Margaret Wei's avatar

Margaret Wei

Metasploit Wrap-Up: Sep. 18, 2020

Exposure Management

Metasploit Wrap-Up: Sep. 18, 2020

Adam Galway's avatar

Adam Galway

NICER Protocol Deep Dive: Internet Exposure of SMB

Threat Research

NICER Protocol Deep Dive: Internet Exposure of SMB

Tod Beardsley's avatar

Tod Beardsley

A step closer to stronger federal IoT security

Industry Trends

A step closer to stronger federal IoT security

Harley Geiger's avatar

Harley Geiger

Decentralize Remediation Efforts to Gain More Efficiency with InsightVM

Exposure Management

Decentralize Remediation Efforts to Gain More Efficiency with InsightVM

Tori Sitcawich's avatar

Tori Sitcawich

This One Time on a Pen Test: How I Outwitted the Vexing VPN

Exposure Management

This One Time on a Pen Test: How I Outwitted the Vexing VPN

Robert Stewart's avatar

Robert Stewart