Reading view

There are new articles available, click to refresh the page.

May 11, 2026 Apple Updates

Apple released Updates on May 11, 2026 for current versions of their Operating System software, as well as for a number of older versions of macOS and iOS/iPadOS. The updates include more than 50 fixes for security issues including Kernel, WebKit, and Network vulnerabilities. Some new features have also been added. As an example, Apple […]

April 22, 2026 Apple Updates

Apple released Updates for iOS 26.4.2/iPadOS 26.4. and iOS 18.7.8/iPadOS 18.7.8 on April 22, 2026.  The updates address CVE-2026-28950, a bug in the Notification Services. Updates that Apple released today address a security vulnerability that the FBI recently used to extract Signal message previews from an iPhone even after the app was deleted. Apple claims the […]

Turning Log Lines into Answers: Instant Clarity for SOC Teams

Security teams are flooded with logs, yet every alert demands fast, accurate context. In Verizon’s 2025 Data Breach Investigations Report [1], they analyzed 22,052 security incidents, of which 12,195 (55%) were confirmed breaches, underscoring how much activity teams must sift through to find what matters.

In practice, that means dozens of investigations per shift, each requiring fast judgment with incomplete context. A 2024 SANS survey shows that SOC teams report alert volume, limited context, and lack of automation continue to slow investigation and response [2].

Speed suffers. So does consistency.

Turn raw logs into a clear narrative

AI-Powered Log Summary in Rapid7 Incident Command transforms raw log data into a clear, concise narrative directly within the investigation workflow. Analysts see what happened, why it matters, and what to do next in seconds, not minutes.

Instead of decoding logs line by line, analysts get:

  • Instant identification of who initiated the activity.

  • Fast understanding of exactly which actions occurred.

  • Clarity into when and where events unfolded.

  • Connectivity into why that behavior matters.

Analysts stay grounded in the original data, but they no longer have to fight through it to find answers. The summary provides immediate orientation and focus, keeping their focus on what to do next.

Built for real SOC workflows

AI-Powered-Log-Summary-Endpoint-Activity-Detail.png
Figure 1: AI-Powered Log Summary Endpoint Activity Detail

AI-Powered Log Summary is embedded directly into the log search workflow. No pivoting, and no context switching. With a single action, analysts generate a contextual summary tailored to their results in seconds. That means faster investigations without breaking flow.

Summaries can be shared with teammates or leadership to communicate findings quickly, without rewriting technical details into plain language. Everyone stays aligned on what happened and what comes next.

AI integration in action

Rapid7 leverages the best available technology to protect our customers' attack surfaces. Our mission drives us to keep abreast of the latest AI advancements to deliver optimal value to customers while effectively managing the inherent risks of the technology. Integrating AI into our core processes enhances our operational security and underscores our commitment to ethical innovation. 

At Rapid7, we are dedicated to leading responsibly in the AI space, ensuring that our technological advancements positively contribute to our customers, company, and society. Read more about how our TRiSM (Trust, Risk, and Security Management) is a foundational strategy that guides us in navigating the intricate landscape of AI with confidence and security.

Less noise, more impact

By reducing time spent parsing logs, teams can focus on what matters: containment, remediation, and proactive threat hunting.

AI-Powered-Log-Summary-Web-Proxy-Detail.png
Figure 2: AI-Powered Log Summary Web Proxy Detail

This brings analysts:

  • Faster triage and investigations.

  • More consistent analysis across shifts.

  • Lower cognitive load during high-volume periods.

  • Clear communication to stakeholders.

Rapid7 is at the vanguard of integrating AI into its products to accelerate outcomes for our customers, with a particular focus on amplifying analyst impact and bringing speed and clarity to SOC operations throughout the threat detection and response lifecycle. 

That is how modern SOC teams move faster. Visit the Incident Command page for more information.

[1] Verizon 2025 DBIR

[2] SANS 2024 SOC Survey

What’s New in Rapid7 Products and Services: Q1 2026 in Review

If product releases had a runway moment, Q1 at Rapid7 would’ve walked out in Cloud Dancer; crisp, confident, and quietly powerful, before breaking into a full gallop in the Year of the Horse. At Rapid7, our first-quarter launches combined velocity with refinement: meaningful enhancements designed to move security teams faster without adding complexity. Let’s cover off the key launches, one by one.

Detection and response

MDR for Microsoft

Getting more value from the tools you already have is an objective shared by all of us. For many of you, that translates to achieving greater security operations outcomes and resilience from your Microsoft technology. With MDR for Microsoft, organizations correlate their Microsoft, Rapid7, and third-party telemetry with prioritized risk context so the service can anticipate attacks before they start. 

AI-powered triage and investigations – backed by unlimited incident response that ensures threats are fully eradicated – delivers certainty in an uncertain attack environment. Dedicated advisory provides strategic recommendations and program hardening guidance that drives long-term security resilience. Customers ultimately experience security operations excellence and achieve stronger outcomes from their existing Microsoft foundation.

Read the blog to learn more.

Rapid7-MDR-for-Microsoft-chart.png
MDR for Microsoft explained

Rapid7 acquires Kenzo Security

The acquisition of Kenzo Security marks another step forward for the Rapid7 Command Platform and Rapid7’s vision for preemptive, AI-powered security operations. In an environment where most security teams are forced to leave large volumes of alerts uninvestigated, Kenzo’s agentic AI capabilities are expected to help accelerate Rapid7 from AI-assisted workflows toward AI-driven, machine-speed operations. Designed around specialized AI agents that work together across security operations tasks, this technology has the potential to reduce manual strain, broaden investigative coverage, and deliver more consistent, precise outcomes.

An average Kenzo customer reported a 94% reduction in investigation time, and their alert coverage increased from 12% to 100%. As these capabilities are brought into MDR, Managed Threat Complete, InsightIDR, and Incident Command, customers will benefit from a stronger, more scalable approach to cyber defense.

Incident Command

User to Identity mapping

Connecting user activity to full identity context is critical for faster, more confident investigations. With User to Identity mapping in Incident Command, analysts can seamlessly link SIEM users to their corresponding identity profiles, gaining instant visibility into MFA status, account posture, and group memberships. By unifying detection and exposure data, teams eliminate manual reconciliation and close visibility gaps across the identity attack surface. This enables faster triage, deeper insight into user risk, and a complete, connected view of identity-driven threats.

user-to-identity-mapping-rapid7-incident-command.png
User to Identity mapping within Incident Command


AI-Powered Log Entry Summary

AI-powered Log Entry Summary brings instant clarity to even the most complex log data. By translating raw log lines into a simple “who, what, when, where, and why” framework, analysts can quickly uncover insights without needing to interpret vendor-specific syntax or business logic. This removes the cognitive burden from investigations and hunts, allowing teams to spot threats faster across all data sources. Teams benefit from accelerated triage, more efficient investigations, and smarter decisions driven by clear, actionable context.

ai-powered-log-entry-summary.png
Instant context with AI Log Entry summary

Exposure management

Cloud Runtime Security (application detection and response)

Earlier this year, we made a significant announcement that Rapid7 had partnered with ARMO to add AI-powered cloud application detection and response (CADR) – or cloud runtime security – to our cloud security portfolio. We are thrilled to announce that these capabilities are now integrated with Rapid7 Exposure Command Ultimate. For our customers, this milestone represents our ability to deliver on the promise of a complete cloud-native application protection platform (CNAPP) that helps security teams preemptively identify and proactively thwart attacks. If you’re interested in learning more about this latest innovation to our cloud security portfolio, reach out to one of our account executives.

cloud-runtime-security-rapid7.png
Runtime security delivering real-time visibility across cloud-native and containerized workloads

Top Remediation Report in Remediation Hub

Understanding which remediations to prioritize is only part of the process, teams also need asset-level detail to act. Top Remediations Report adds that context in Remediation Hub, with customizable filters, shared visibility across teams, and automated scheduling for recurring delivery to key stakeholders in CSV, HTML, or PDF. The result is faster coordination, clearer ownership, and quicker remediation progress.

Remediation Bulk Export API

We understand that organizations need to customize reporting for various stakeholders and levels across their business to drive effective vulnerability remediation and communicate security posture. One of the ways that organizations address this need is through our powerful cloud-based API, which enables teams to extract and export large amounts of security data into external tools like Tableau or PowerBI. Customers can export security data at scale, including assets, vulnerabilities, remediations and agent-based policy data, resulting in more flexible reporting and querying.

Data Security Posture Management (DSPM)

Understanding which exposures threaten sensitive data is difficult when data security and exposure insights live in separate tools. A partnership between Rapid7 and Symmetry Systems brings those perspectives together on Exposure Command, aligning sensitive data intelligence with real attacker reachability. DSPM capabilities discover sensitive data and map identity access, helping teams prioritize remediation based on breach impact.

Read the blog to learn how aligning data and exposure reduces breach risk.

automated-sensitive-data-discovery.png
Automated Sensitive Data Discovery: See how PII, PHI and Financial Data is flagged

Attack surface management

Dynamic External Attack Surface Discovery

Your attack surface doesn’t stand still, and point-in-time visibility can leave teams chasing what’s already changed. Dynamic EASM Discovery helps Surface Command automatically identify and track changes across the external attack surface by ingesting domain and IP data from across the environment. The result is more current visibility, fewer blind spots, and stronger confidence that teams are prioritizing and validating the exposures that matter most.

Read the blog to see how Dynamic EASM Discovery helps teams keep pace with a changing attack surface.

rapid7-command-platform-easm-seed-data.png
The Rapid7 Command Platform displaying your EASM seed data

Platform and Labs

Rapid7 Command Platform

We’re excited to introduce a centralized way to programmatically access data across all managed tenants with new multi-tenant API keys. For organizations managing multiple environments, tenants, or customers, integrating with each one individually has traditionally required significant manual effort, creating, maintaining, and rotating separate API keys for every tenant. This not only slows down development but also increases operational overhead and the risk of inconsistency.

With this new capability, you can build a single integration that seamlessly “loops” through tenants automatically, enabling consistent data access and streamlined workflows at scale. Whether you’re aggregating data for reporting, powering automation, or integrating with third-party tools, multi-tenant API keys simplify the process and reduce complexity, freeing up your teams to focus on higher-value tasks instead of repetitive configuration. Read all about it in our blog

Rapid7 Labs

The latest threat research reports from Rapid7 Labs

This quarter Rapid7 Labs continued to deliver critical insights into the evolving threat landscape, uncovering how attackers are adapting their tactics – from stealthy, long-term intrusions to increasingly targeted and data-driven attacks. Our latest research reports highlight the growing complexity of modern threats and the real-world risks facing organizations today. Explore the findings below to better understand what’s changing and what it means for your security strategy.

  • BPFdoor in Telecom Networks: Sleeper Cells in the Backbone: Rapid7 uncovered a long-running espionage campaign in which a China-nexus threat actor, Red Menshen, embedded stealthy “sleeper cells” inside global telecommunications networks using the BPFdoor backdoor. Operating at the Linux kernel level, this malware enables persistent, hard-to-detect access without typical network signals, allowing attackers to monitor communications, subscriber data, and critical infrastructure over time. The research highlights a shift from opportunistic attacks to deliberate, long-term pre-positioning inside core systems that underpin global connectivity, raising national-level risk.

  • 2026 Global Threat Landscape Report: The latest report from Rapid7 Labs delivers an in-depth analysis of global adversary behavior, drawing on telemetry from Rapid7 MDR investigations, vulnerability intelligence, and frontline incident response. This year’s findings highlight a rapidly evolving threat environment, marked by the collapse of the window between vulnerability disclosure and exploitation, the continued industrialization of ransomware operations, and the acceleration of modern attacks through the use of AI.

  • Executives’ Digital Footprints Threat Report: Today, 60% of an executive’s digital risk exposure is retrievable through surface web searches, including public records, professional history, and social media activity — all of which can be weaponized for highly targeted attacks. The Executive Digital Footprints Threat Report from Rapid7 Labs details how these executive digital footprints are an often overlooked threat vector that can be exploited, posing risks to the executive, their families, and organizations.

Exposing the Chrysalis Backdoor

Last month, Rapid7 uncovered the Chrysalis backdoor, a sophisticated supply chain attack that leveraged the Notepad++ update mechanism to selectively target organizations with a stealthy, persistent backdoor. This discovery highlights the growing risk of trusted software being weaponized and the real-world impact of advanced, targeted campaigns that can evade traditional defenses, reinforcing the importance of continuous monitoring and validating third-party software behavior in today’s threat landscape. Learn more about the Chrysalis backdoor here, and see more details on its impact and what you can do next here.

Cyber threat activity related to the Iran conflict

Rapid7 is actively monitoring cyber threat activity related to the Iran conflict, providing support for our customers and the cybersecurity community. Review observed activity, official advisories, and recommended defensive actions here.

Announcing Metasploit Pro 5.0.0

We’re excited to announce the launch of Metasploit Pro 5.0.0, a major evolution in red-team and penetration testing. Built to address today’s dynamic threat landscape, this release delivers a significantly improved UI, usability, validation, and workflow improvements that empower security teams to validate vulnerabilities faster and more effectively. Learn more in our blog post here.

newly-designed-metasploit-interface.png
Newly designed interface of Metasploit Pro

We’re just getting started

The innovation doesn’t stop here. We have a strong pipeline of product enhancements and new capabilities rolling out all year long. Be sure to follow our blog and release notes to see how Rapid7 continues to advance our platform and deliver greater value.

April 1, 2026 Apple Security Updates

Apple has released Security Updates on April 1, 2026, to address multiple CVEs associated with the DarkSword exploit, thus making iOS/iPadOS 18.7.7 available to more devices that have not updated to v.26.x. Although the updates contain numerous security vulnerability fixes, caution should be taken if updating immediately after the updates are released and unintended consequences […]

March 24, 2026 Apple Security Updates

For the fourth time this month Apple updates were released on March 24, 2026. These security updates address multiple CVEs related to, among other things, WebKit, Kernel and 802.1X networking, as well as bug fixes and new features. Also included are updates for older versions of watchOS that provide enhancements and have no published CVE […]

March 17. 2026 Apple Updates

Apple released Background Security Improvements on March 17, 2026, for macOS, iOS, and iPadOS. Apple provides Information on the Security content of the updates for CVE-2026-20643: Thomas Espach that affects Webkit and Safari. Background Security Improvements deliver additional security protections between software updates. How to check if you have received these Background Security Improvements: On […]

March 11, 2026 Apple Updates

More Apple updates were released on March 11, 2026, this time to fix security vulnerabilities for older iOS and iPadOS devices that cannot update to the latest iOS and iPadOS versions. iOS/iPadOS 16.7.15 addresses WebKit bug fixes associated with the Coruna exploit that may lead to memory corruption (CVE-2023-43010: Apple). iOS/iPadOS 15.8.7, available for even […]

Getting back to basics

TAME YOUR TECH By Susan Bradley We now know that 59 percent of AskWoody’s readers have at least tried interacting with an AI assistant and that only 24 percent use it regularly. We understand the hesitation that those statistics imply. Nonetheless, it’s clear that people in our audience and beyond are using the latest AI […]

March 4, 2026 Apple Updates

Apple has  released Operating System updates on March 4, 2026 for some of it’s devices, including macOS Tahoe 26.3.1, iOS 26.3.1 and iPadOS 26.3.1. These updates include bug fixes and support for the new Studio Display. An update to iOS 18.7.6 was also released to address Australia’s Emergency Call issues. Before attempting to upgrade your […]

Jumping back into the patching waters

PATCH WATCH By Susan Bradley If you are a bit timid about February’s patches and not looking forward to installing them, I don’t blame you. The last few months have been bumpy, to say the least. But neither I nor the five Windows 11 and two Windows 10 machines at my house, the one Windows […]

February 11, 2026 Apple Updates

Apple has outdone itself with the third batch of updates for the month of February, 2026. These updates include security and bug fixes, as well as newer 26.3 versions of the latest Operating Systems for Macs, iPhones, iPads, and Apple Watches. Before attempting to upgrade your devices, be sure to back up your data and […]

February 2, 2026 Apple Updates

On February 2, 2026, Apple released Operating System updates for older versions of macOS, iOS, iPadOS, and watchOS to keep FaceTime and Messages working. Like other older OS updates issued January 26, 2026, these updates include revised Certificates in the Operating Systems. The new Certificates are set to expire in January, 2027. Apple also stopped […]

Separating fact from fiction with a new system

ISSUE 22.51 • 2025-12-22 TAME YOUR TECH By Susan Bradley Lately, I’ve seen several posts and questions about setting up a new system, as well as lingering concerns about Windows 10 ESUs. Some of these questions make me wonder about not only the quality of resources provided by vendors, but also the quality of results […]

December 2025 Apple Security Updates

On December 12, 2025, Apple released Operating System updates for most of its current devices. The patches included numerous Security fixes. The size of the Updates has been included as observed on my devices and well as which iOS/iPadOS version was offered. Strangely enough, Apple seems to be pushing iOS 26.2 to capable iPhones (even […]

Windows 10 Extended Security Updates begin

ISSUE 22.45.1 • 2025-11-13 PATCH WATCH By Susan Bradley This is the first month for updates from the Windows 10 Extended Security Updates (ESU) plan. If you’ve signed up for the ESU, you should start seeing them as you would have seen any updates in the past. But that doesn’t mean you should install them […]

MS-DEFCON 2: The first month of ESU

ISSUE 22.44.1 • 2025-11-06 By Susan Bradley This month marks the first time that security updates will be released to Windows 10 under Microsoft’s Extended Security Update program. If you’ve enrolled in the ESU plan, you should see them offered in Windows Update. But that does not mean you should install them now. Nothing has […]
❌