The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine

Rapid7 Blog

Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine

Bri Hand's avatar

Bri Hand

How InsightIDR Is Accelerating Detection and Response in Modern Environments

Detection and Response

How InsightIDR Is Accelerating Detection and Response in Modern Environments

Margaret Wei's avatar

Margaret Wei

Confessions of a Former CISO: Promoting Individual Contributors into Leadership Roles

Security Operations

Confessions of a Former CISO: Promoting Individual Contributors into Leadership Roles

Scott King's avatar

Scott King

Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses

Rapid7 Blog

Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses

Harley Geiger's avatar

Harley Geiger

Metasploit Wrap-Up: Apr. 17, 2020

Exposure Management

Metasploit Wrap-Up: Apr. 17, 2020

Spencer McIntyre's avatar

Spencer McIntyre

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Detection and Response

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Wade Hickey's avatar

Wade Hickey

Nmap Service Detection for Nexpose and InsightVM Scan Engines

Products and Tools

Nmap Service Detection for Nexpose and InsightVM Scan Engines

Patrick Fitzsimons's avatar

Patrick Fitzsimons

Preparing for the Cybersecurity Maturity Model Certification (CMMC) Part 1: Practice and Process

Rapid7 Blog

Preparing for the Cybersecurity Maturity Model Certification (CMMC) Part 1: Practice and Process

Brian Carey's avatar

Brian Carey

Meet AttackerKB

Threat Research

Meet AttackerKB

Caitlin Condon's avatar

Caitlin Condon

Patch Tuesday - April 2020

Detection and Response

Patch Tuesday - April 2020

Richard Tsang's avatar

Richard Tsang

Remote Work Readiness: How to Keep a Security Mindset

Rapid7 Blog

Remote Work Readiness: How to Keep a Security Mindset

Bri Hand's avatar

Bri Hand

Metasploit Wrap-Up: 4/10/20

Exposure Management

Metasploit Wrap-Up: 4/10/20

Pearce Barry's avatar

Pearce Barry

Self-Isolation, Home Networking, and Open Source: Recog and Rumble

Rapid7 Blog

Self-Isolation, Home Networking, and Open Source: Recog and Rumble

Tod Beardsley's avatar

Tod Beardsley

8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization

Exposure Management

8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization

Laurel Marotta's avatar

Laurel Marotta

Phishing for SYSTEM on Microsoft Exchange (CVE-2020-0688)

Detection and Response

Phishing for SYSTEM on Microsoft Exchange (CVE-2020-0688)

Tom Sellers's avatar

Tom Sellers

4 Common Goals For Vulnerability Risk Management Programs

Products and Tools

4 Common Goals For Vulnerability Risk Management Programs

Wade Woolwine's avatar

Wade Woolwine

Metasploit Wrap-Up 4/3/2020

Products and Tools

Metasploit Wrap-Up 4/3/2020

Christophe De La Fuente's avatar

Christophe De La Fuente

Analyze Security Data Faster with Visual Search in InsightIDR

Detection and Response

Analyze Security Data Faster with Visual Search in InsightIDR

Meaghan Buchanan's avatar

Meaghan Buchanan

Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities

Exposure Management

Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities

Tod Beardsley's avatar

Tod Beardsley

SOC Automation: Threat Detection and Response with SIEM and SOAR

Products and Tools

SOC Automation: Threat Detection and Response with SIEM and SOAR

Lauren Taylor's avatar

Lauren Taylor

Reduce False Positive Vulnerabilities by Up To 22%

Products and Tools

Reduce False Positive Vulnerabilities by Up To 22%

Greg Wiseman's avatar

Greg Wiseman