All Posts

7 min Emergent Threat Response

Under Siege: Rapid7-Observed Exploitation of Cisco ASA SSL VPNs

Rapid7’s managed detection and response (MDR) teams have observed increased threat activity targeting Cisco ASA SSL VPN appliances (physical and virtual) dating back to at least March 2023, including several incidents that ended in ransomware deployment.

3 min Metasploit

Metasploit Weekly Wrap-Up

Power[shell]Point This week’s new features and improvements start with two new exploit modules leveraging CVE-2023-34960 [] Chamilo versions 1.11.18 and below and CVE-2023-26469 [] in Jorani 1.0.0. Like CVE-2023-34960 [], I too, feel attacked by PowerPoint sometimes. We also have several impr

4 min Cloud Security

Why Your AWS Cloud Container Needs Client-Side Security

With complex network infrastructure and the need to deploy applications across various environments, cloud containers have become increasingly necessary.

3 min Vendor Consolidation

Three Security Vendor Consolidation Myths Debunked

While security vendor consolidation has many advantages, it’s clear that some myths about consolidation persist.

3 min Ransomware

Ransomware-as-a-Service Cheat Sheet

Ransomware-as-a-Service, or RaaS, has taken the threat landscape by storm. Learn how to protect your organization against RaaS attacks.

2 min Awards

Rapid7 Takes 2023 SC Awards for Vulnerability Management and Threat Detection

Rapid7 is proud to announce we have received not one, but two prestigious SC Awards this year!

2 min Metasploit

Metasploit Weekly Wrap-Up

Meterpreter Testing This week’s release adds new payload tests to our automated test suite. This is intended to help the team and community members identify issues and behavior discrepancies before changes are made. Payloads run on a variety of different platforms including Windows, Linux, and OS X each of which has multiple Meterpreter implementations available that are now tested to help ensure consistency. This should improve payload stability and make testing easier for community members tha

2 min Velociraptor

Join us for VeloCON 2023: Digging Deeper Together!

Rapid7 is thrilled to announce that the 2nd annual VeloCON: Digging Deeper Together virtual summit will be held this September 13th at 9 am ET.

1 min

Rapid7’s Mid-Year Threat Review

Rapid7’s 2023 Mid-Year Threat Review aggregates data and analysis from our vulnerability intelligence, managed services, and threat analytics teams to provide a mid-year snapshot of the attack landscape and give organizations actionable guidance on protecting themselves from common threats.

7 min Vulnerability Management

What's New in CVSS v4

CVSS v4 ushers in some meaningful improvements wrapped in a bit of nuanced complexity, especially if you’re a vendor or threat researcher.

2 min Metasploit

Metasploit weekly wrap-up

A new Metabase RCE module, updates to the citrix_formssso_target_rce module for CVE-2023-3519 to include two new targets, Citrix ADC (NetScaler) 12.1-65.25, and 12.1-64.17, and more

9 min Vulnerability Management

Patch Tuesday - August 2023

ASP.NET zero-day vuln. Teams malicious meetings. MSMQ critical RCE. Patches & a makeover for last month's unpatched zero-day vuln.

4 min

A Message from Rapid7 CEO, Corey Thomas

Earlier today, the following email was shared with Rapid7 employees.

4 min Metasploit

Metasploit Weekly Wrap-Up

Fly High in the Sky With This New Cloud Exploit! This week, a new module was added that takes advantage of both authentication bypass and command injection in certain versions of Western Digital's MyCloud hardware. Submitted by community member Erik Wynter [], this module gains access to the target, attempts to bypass authentication, verifies whether that was successful, then executes the payload with root privileges. This works on versions before 2.30.196, and offer

3 min Penetration Testing

PenTales: A Badge, a Tag, and a Bunch of Unattended Chemicals; Why Physical Social Engineering Engagements are an Important Part of Security

In this series, we’re going to share some of our favorite tales from the pen test desk and hopefully highlight some ways you can improve your own organization’s security.