3 min
Ransomware
To Maze and Beyond: How the Ransomware Double Extortion Space Has Evolved
Our research shows the "market share" of ransomware groups and how much they focused on different types of data.
5 min
SOAR
5 SOAR Myths Debunked
As organizations increasingly use SOAR systems to keep up with their security operations challenges, here are 5 SOAR myths worth debunking.
3 min
AWS
Rapid7 at AWS re:Inforce: 2 Big Announcements
Here's a look at how Rapid7 is building on our existing partnership with Amazon Web Services to help organizations securely advance.
3 min
Vulnerability Disclosure
CVE-2022-35629..35632 Velociraptor Multiple Vulnerabilities (FIXED)
This advisory covers a number of issues identified in Velociraptor and fixed as of Version 0.6.5-2, released July 26, 2022.
2 min
Compliance
ISO 27002 Emphasizes Need For Threat Intelligence
Earlier this year, the International Organization for Standardization (ISO) released ISO 27002, which features a dedicated threat intelligence control.
3 min
AWS
What We’re Looking Forward to at AWS re:Inforce
Here's a sneak peak at some of the highlights to come this week at AWS re:Inforce and what we're looking forward to the most.
3 min
Metasploit
Metasploit Weekly Wrap-Up: 7/22/22
The past, present and future of Metasploit
Don't miss Spencer McIntyre's talk on the Help Net Security's blog
. Spencer is the Lead Security Researcher at Rapid7 and speaks about how
Metasploit has evolved since its creation back in 2003. He also explains how the
Framework is addressing today's offensive security challenges and how important
is the partnership with the community.
LDAP swiss army knife
This week,
4 min
Cloud Security
Cloud Threat Detection: To Agent or Not to Agent?
Should you be using agents to secure cloud applications, or not? The answer depends on what exactly you're trying to secure.
3 min
SIEM
Simplify SIEM Optimization With InsightIDR
For far too many years, security teams have accepted that with a SIEM comes compromise. With InsightIDR, you can have the best of both worlds.
4 min
Managed Detection and Response (MDR)
4 Key Statistics to Build a Business Case for an MDR Partner
Any MDR financial justification will come down to four main factors: return on investment (ROI), savings from building out your SOC team, the reduction in risk to your organization, and the time to see value/impact.
4 min
SOAR
Deploying a SOAR Tool Doesn’t Have to Be Hard: I’ve Done It Twice
Here are some lessons learned launching and steps for success when launching a SOAR tool for the first time.
3 min
Cloud Security
4 Strategies for Achieving Greater Visibility in the Cloud
Here are four ways to put visibility at the center of your cloud security approach and better understand what's going on in your environment.
2 min
Detection and Response
Gimme! Gimme! Gimme! (More Data): What Security Pros Are Saying
Eight in 10 organizations collect, process, and analyze security operations data from more than 10 sources, but security analysts need even more.
5 min
Vulnerability Disclosure
CVE-2022-30526 (Fixed): Zyxel Firewall Local Privilege Escalation
Rapid7 discovered a local privilege escalation vulnerability affecting Zyxel firewalls. The vulnerability allows a low privileged user, such as `nobody`, to escalate to `root` on affected firewalls.
2 min
Application Security
Deploy tCell More Easily With the New AWS AMI Agent
We've introduced the AWS AMI Agent for tCell, which makes it easier to deploy tCell into your software development life cycle.