The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

PowerShell: How to Defend Against Malicious PowerShell Attacks

Security Operations

PowerShell: How to Defend Against Malicious PowerShell Attacks

Josh Frantz's avatar

Josh Frantz

How Cybercriminals Use Pinterest to Run Fraud Scams

Vulnerabilities and Exploits

How Cybercriminals Use Pinterest to Run Fraud Scams

Orin Mor's avatar

Orin Mor

Password Tips from a Pen Tester: Are 12-Character Passwords Really Stronger, or Just a Dime a Dozen?

Exposure Management

Password Tips from a Pen Tester: Are 12-Character Passwords Really Stronger, or Just a Dime a Dozen?

Patrick Laverty's avatar

Patrick Laverty

The Newegg Breach: PCI Means Nothing to Magecart

Cloud and Devops Security

The Newegg Breach: PCI Means Nothing to Magecart

Rapid7's avatar

Rapid7

Putting Pen (Tests) to Paper: Lessons and Learnings from Rapid7’s Annual Mega-Hackathon

Exposure Management

Putting Pen (Tests) to Paper: Lessons and Learnings from Rapid7’s Annual Mega-Hackathon

Caitlin Condon's avatar

Caitlin Condon

This One Time on a Pen Test, Part 4: From Zero to Web Application Admin through Open-Source Intelligence Gathering

Threat Research

This One Time on a Pen Test, Part 4: From Zero to Web Application Admin through Open-Source Intelligence Gathering

Jordan LaRose's avatar

Jordan LaRose

Metasploit Wrapup 9/21/18

Products and Tools

Metasploit Wrapup 9/21/18

Brendan Watters's avatar

Brendan Watters

The British Airways Breach: PCI is Not Enough

Exposure Management

The British Airways Breach: PCI is Not Enough

Rapid7's avatar

Rapid7

Introducing Security Orchestration and Automation (SOAR) on the Rapid7 Insight Platform

Security Operations

Introducing Security Orchestration and Automation (SOAR) on the Rapid7 Insight Platform

Jen Andre's avatar

Jen Andre

Detecting Inbound RDP Activity From External Clients

Detection and Response

Detecting Inbound RDP Activity From External Clients

Rapid7's avatar

Rapid7

Rapid7 Threat Intelligence Book Club: ‘Countdown to Zero Day’ Recap

Exposure Management

Rapid7 Threat Intelligence Book Club: ‘Countdown to Zero Day’ Recap

Rapid7's avatar

Rapid7

Pen Test, Part 3: Jumping a Fence and Donning a Disguise

Exposure Management

Pen Test, Part 3: Jumping a Fence and Donning a Disguise

Leon Johnson's avatar

Leon Johnson

Metasploit Wrapup 9/14/18

Products and Tools

Metasploit Wrapup 9/14/18

Sonny Gonzalez's avatar

Sonny Gonzalez

Do You Know Your AppSec ROI?

Rapid7 Blog

Do You Know Your AppSec ROI?

Rapid7's avatar

Rapid7

How to Identify and Prioritize Gaps with the Cybersecurity Maturity Assessment, Post-2018 'Under the Hoodie'

Exposure Management

How to Identify and Prioritize Gaps with the Cybersecurity Maturity Assessment, Post-2018 'Under the Hoodie'

Scott King's avatar

Scott King

HUMINT: The Riskiest (and Most Valuable) Form of Intelligence Gathering

Threat Research

HUMINT: The Riskiest (and Most Valuable) Form of Intelligence Gathering

Nathan Teplow's avatar

Nathan Teplow

Patch Tuesday - September 2018

Exposure Management

Patch Tuesday - September 2018

Greg Wiseman's avatar

Greg Wiseman

Pen Test, Part 2: How Just One Flaw Helped Us Beat the Unbeatable Network

Exposure Management

Pen Test, Part 2: How Just One Flaw Helped Us Beat the Unbeatable Network

Matt Hand's avatar

Matt Hand

Serverless and the OWASP Top 10

Rapid7 Blog

Serverless and the OWASP Top 10

Rapid7's avatar

Rapid7

Metasploit Wrapup 9/7/18

Products and Tools

Metasploit Wrapup 9/7/18

Adam Cammack's avatar

Adam Cammack

External Metasploit Modules: The Gift that Keeps on Slithering

Products and Tools

External Metasploit Modules: The Gift that Keeps on Slithering

Adam Cammack's avatar

Adam Cammack