The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Detection and Response

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Wade Hickey's avatar

Wade Hickey

Nmap Service Detection for Nexpose and InsightVM Scan Engines

Products and Tools

Nmap Service Detection for Nexpose and InsightVM Scan Engines

Patrick Fitzsimons's avatar

Patrick Fitzsimons

Preparing for the Cybersecurity Maturity Model Certification (CMMC) Part 1: Practice and Process

Rapid7 Blog

Preparing for the Cybersecurity Maturity Model Certification (CMMC) Part 1: Practice and Process

Brian Carey's avatar

Brian Carey

Meet AttackerKB

Threat Research

Meet AttackerKB

Caitlin Condon's avatar

Caitlin Condon

Patch Tuesday - April 2020

Detection and Response

Patch Tuesday - April 2020

Richard Tsang's avatar

Richard Tsang

Remote Work Readiness: How to Keep a Security Mindset

Rapid7 Blog

Remote Work Readiness: How to Keep a Security Mindset

Bri Hand's avatar

Bri Hand

Metasploit Wrap-Up: 4/10/20

Exposure Management

Metasploit Wrap-Up: 4/10/20

Pearce Barry's avatar

Pearce Barry

Self-Isolation, Home Networking, and Open Source: Recog and Rumble

Rapid7 Blog

Self-Isolation, Home Networking, and Open Source: Recog and Rumble

Tod Beardsley's avatar

Tod Beardsley

8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization

Exposure Management

8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization

Laurel Marotta's avatar

Laurel Marotta

Phishing for SYSTEM on Microsoft Exchange (CVE-2020-0688)

Detection and Response

Phishing for SYSTEM on Microsoft Exchange (CVE-2020-0688)

Tom Sellers's avatar

Tom Sellers

4 Common Goals For Vulnerability Risk Management Programs

Products and Tools

4 Common Goals For Vulnerability Risk Management Programs

Wade Woolwine's avatar

Wade Woolwine

Metasploit Wrap-Up 4/3/2020

Products and Tools

Metasploit Wrap-Up 4/3/2020

Christophe De La Fuente's avatar

Christophe De La Fuente

Analyze Security Data Faster with Visual Search in InsightIDR

Detection and Response

Analyze Security Data Faster with Visual Search in InsightIDR

Meaghan Buchanan's avatar

Meaghan Buchanan

Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities

Exposure Management

Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities

Tod Beardsley's avatar

Tod Beardsley

SOC Automation: Threat Detection and Response with SIEM and SOAR

Products and Tools

SOC Automation: Threat Detection and Response with SIEM and SOAR

Lauren Taylor's avatar

Lauren Taylor

Reduce False Positive Vulnerabilities by Up To 22%

Products and Tools

Reduce False Positive Vulnerabilities by Up To 22%

Greg Wiseman's avatar

Greg Wiseman

A Chat with Jonathan Cran About Intrigue and Security in the COVID-19 Pandemic

Industry Trends

A Chat with Jonathan Cran About Intrigue and Security in the COVID-19 Pandemic

Bri Hand's avatar

Bri Hand

Working from Home? Wi-Fi Security and Tips and Tricks

Rapid7 Blog

Working from Home? Wi-Fi Security and Tips and Tricks

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrap-Up: 3/27/20

Products and Tools

Metasploit Wrap-Up: 3/27/20

Erin Bleiweiss's avatar

Erin Bleiweiss

How to Participate in Our Metasploit Pro Customer Survey

Products and Tools

How to Participate in Our Metasploit Pro Customer Survey

Oriana Ott's avatar

Oriana Ott

Rapid7 Named a March 2020 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Products and Tools

Rapid7 Named a March 2020 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Rapid7's avatar

Rapid7