The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrapup: 10/5/18

Products and Tools

Metasploit Wrapup: 10/5/18

Jacob Robles's avatar

Jacob Robles

Security Orchestration and Automation: Not Just for Mature Organizations

Security Operations

Security Orchestration and Automation: Not Just for Mature Organizations

Jordan Ugalde's avatar

Jordan Ugalde

This One Time on a Pen Test, Part 5: From Physical Security Weakness to Strength

Exposure Management

This One Time on a Pen Test, Part 5: From Physical Security Weakness to Strength

Steve Laura's avatar

Steve Laura

Metasploit Wrapup: 9/28/18

Products and Tools

Metasploit Wrapup: 9/28/18

Erin Bleiweiss's avatar

Erin Bleiweiss

PowerShell: How to Defend Against Malicious PowerShell Attacks

Security Operations

PowerShell: How to Defend Against Malicious PowerShell Attacks

Josh Frantz's avatar

Josh Frantz

How Cybercriminals Use Pinterest to Run Fraud Scams

Vulnerabilities and Exploits

How Cybercriminals Use Pinterest to Run Fraud Scams

Orin Mor's avatar

Orin Mor

Password Tips from a Pen Tester: Are 12-Character Passwords Really Stronger, or Just a Dime a Dozen?

Exposure Management

Password Tips from a Pen Tester: Are 12-Character Passwords Really Stronger, or Just a Dime a Dozen?

Patrick Laverty's avatar

Patrick Laverty

The Newegg Breach: PCI Means Nothing to Magecart

Cloud and Devops Security

The Newegg Breach: PCI Means Nothing to Magecart

Rapid7's avatar

Rapid7

Putting Pen (Tests) to Paper: Lessons and Learnings from Rapid7’s Annual Mega-Hackathon

Exposure Management

Putting Pen (Tests) to Paper: Lessons and Learnings from Rapid7’s Annual Mega-Hackathon

Caitlin Condon's avatar

Caitlin Condon

This One Time on a Pen Test, Part 4: From Zero to Web Application Admin through Open-Source Intelligence Gathering

Threat Research

This One Time on a Pen Test, Part 4: From Zero to Web Application Admin through Open-Source Intelligence Gathering

Jordan LaRose's avatar

Jordan LaRose

Metasploit Wrapup 9/21/18

Products and Tools

Metasploit Wrapup 9/21/18

Brendan Watters's avatar

Brendan Watters

The British Airways Breach: PCI is Not Enough

Exposure Management

The British Airways Breach: PCI is Not Enough

Rapid7's avatar

Rapid7

Introducing Security Orchestration and Automation (SOAR) on the Rapid7 Insight Platform

Security Operations

Introducing Security Orchestration and Automation (SOAR) on the Rapid7 Insight Platform

Jen Andre's avatar

Jen Andre

Detecting Inbound RDP Activity From External Clients

Detection and Response

Detecting Inbound RDP Activity From External Clients

Rapid7's avatar

Rapid7

Rapid7 Threat Intelligence Book Club: ‘Countdown to Zero Day’ Recap

Exposure Management

Rapid7 Threat Intelligence Book Club: ‘Countdown to Zero Day’ Recap

Rapid7's avatar

Rapid7

Pen Test, Part 3: Jumping a Fence and Donning a Disguise

Exposure Management

Pen Test, Part 3: Jumping a Fence and Donning a Disguise

Leon Johnson's avatar

Leon Johnson

Metasploit Wrapup 9/14/18

Products and Tools

Metasploit Wrapup 9/14/18

Sonny Gonzalez's avatar

Sonny Gonzalez

Do You Know Your AppSec ROI?

Rapid7 Blog

Do You Know Your AppSec ROI?

Rapid7's avatar

Rapid7

How to Identify and Prioritize Gaps with the Cybersecurity Maturity Assessment, Post-2018 'Under the Hoodie'

Exposure Management

How to Identify and Prioritize Gaps with the Cybersecurity Maturity Assessment, Post-2018 'Under the Hoodie'

Scott King's avatar

Scott King

HUMINT: The Riskiest (and Most Valuable) Form of Intelligence Gathering

Threat Research

HUMINT: The Riskiest (and Most Valuable) Form of Intelligence Gathering

Nathan Teplow's avatar

Nathan Teplow

Patch Tuesday - September 2018

Exposure Management

Patch Tuesday - September 2018

Greg Wiseman's avatar

Greg Wiseman