The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

May 2020 Cisco Remote Vulnerabilities Guidance

Vulnerabilities and Exploits

May 2020 Cisco Remote Vulnerabilities Guidance

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up: May 8, 2020

Products and Tools

Metasploit Wrap-Up: May 8, 2020

Grant Willcox's avatar

Grant Willcox

Best Practices for Securing e-Commerce Applications

Products and Tools

Best Practices for Securing e-Commerce Applications

Bria Grangard's avatar

Bria Grangard

How to Increase Your Security Team's Visibility Within Your Organization—And What Happens When You Do

Products and Tools

How to Increase Your Security Team's Visibility Within Your Organization—And What Happens When You Do

Tori Sitcawich's avatar

Tori Sitcawich

Why SOAR Is an Essential Cybersecurity Tool for Financial Services Companies

Security Operations

Why SOAR Is an Essential Cybersecurity Tool for Financial Services Companies

Lauren Taylor's avatar

Lauren Taylor

5 Challenges Outsourced Detection and Response Operations Can Help Solve

Products and Tools

5 Challenges Outsourced Detection and Response Operations Can Help Solve

Ellis Fincham's avatar

Ellis Fincham

Metasploit Wrap-Up 5/1/20

Exposure Management

Metasploit Wrap-Up 5/1/20

Alan David Foster's avatar

Alan David Foster

Gartner® Recognizes Rapid7
 Vulnerability Management for Application Security Capabilities

Products and Tools

Gartner® Recognizes Rapid7 Vulnerability Management for Application Security Capabilities

Bria Grangard's avatar

Bria Grangard

Rapid7 Announces Intent to Acquire DivvyCloud

Cloud and Devops Security

Rapid7 Announces Intent to Acquire DivvyCloud

Lee Weiner's avatar

Lee Weiner

CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability Remediation Guidance and Exposure Overview

Vulnerabilities and Exploits

CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability Remediation Guidance and Exposure Overview

boB Rudis's avatar

boB Rudis

The Healthcare Security Pro's Guide to Ransomware Attacks

Industry Trends

The Healthcare Security Pro's Guide to Ransomware Attacks

Jeremiah Dewey's avatar

Jeremiah Dewey

Metasploit Wrap-Up 4/24/20

Exposure Management

Metasploit Wrap-Up 4/24/20

Adam Cammack's avatar

Adam Cammack

Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine

Rapid7 Blog

Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine

Bri Hand's avatar

Bri Hand

How InsightIDR Is Accelerating Detection and Response in Modern Environments

Detection and Response

How InsightIDR Is Accelerating Detection and Response in Modern Environments

Margaret Wei's avatar

Margaret Wei

Confessions of a Former CISO: Promoting Individual Contributors into Leadership Roles

Security Operations

Confessions of a Former CISO: Promoting Individual Contributors into Leadership Roles

Scott King's avatar

Scott King

Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses

Rapid7 Blog

Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses

Harley Geiger's avatar

Harley Geiger

Metasploit Wrap-Up: Apr. 17, 2020

Exposure Management

Metasploit Wrap-Up: Apr. 17, 2020

Spencer McIntyre's avatar

Spencer McIntyre

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Detection and Response

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Wade Hickey's avatar

Wade Hickey

Nmap Service Detection for Nexpose and InsightVM Scan Engines

Products and Tools

Nmap Service Detection for Nexpose and InsightVM Scan Engines

Patrick Fitzsimons's avatar

Patrick Fitzsimons

Preparing for the Cybersecurity Maturity Model Certification (CMMC) Part 1: Practice and Process

Rapid7 Blog

Preparing for the Cybersecurity Maturity Model Certification (CMMC) Part 1: Practice and Process

Brian Carey's avatar

Brian Carey

Meet AttackerKB

Threat Research

Meet AttackerKB

Caitlin Condon's avatar

Caitlin Condon