The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Rsunk your Battleship: An Ocean of Data Exposed through Rsync

Threat Research

Rsunk your Battleship: An Ocean of Data Exposed through Rsync

Jon Hart's avatar

Jon Hart

How to Use the InsightVM Policy Compliance Status Report to Measure Benchmark Configurations

Exposure Management

How to Use the InsightVM Policy Compliance Status Report to Measure Benchmark Configurations

Jesika McEvoy's avatar

Jesika McEvoy

Rapid7 Partners with AWS Security Hub for Deeper Vulnerability Reporting

Exposure Management

Rapid7 Partners with AWS Security Hub for Deeper Vulnerability Reporting

Alfred Chung's avatar

Alfred Chung

Windows Event Forwarding: The Best Thing You’ve Never Heard Of

Detection and Response

Windows Event Forwarding: The Best Thing You’ve Never Heard Of

Josh Frantz's avatar

Josh Frantz

Charting the Forthcoming PHPocalypse in 2019

Threat Research

Charting the Forthcoming PHPocalypse in 2019

boB Rudis's avatar

boB Rudis

Metasploit Wrapup 12/14/18

Products and Tools

Metasploit Wrapup 12/14/18

Shelby Pace's avatar

Shelby Pace

Securing Buckets with Amazon S3 Block Public Access

Threat Research

Securing Buckets with Amazon S3 Block Public Access

Rapid7's avatar

Rapid7

Metasploit Wrapup 12/7/18

Exposure Management

Metasploit Wrapup 12/7/18

Brendan Watters's avatar

Brendan Watters

Single-Page Applications: The Journey So Far

Products and Tools

Single-Page Applications: The Journey So Far

Mark Hamill's avatar

Mark Hamill

Seeing Security Scale: Rapid7’s Recap of AWS re:Invent 2018

Security Operations

Seeing Security Scale: Rapid7’s Recap of AWS re:Invent 2018

Jay Brewer's avatar

Jay Brewer

Did You Remediate That? New InsightVM Executive Report Provides Key Details on Team Progress

Exposure Management

Did You Remediate That? New InsightVM Executive Report Provides Key Details on Team Progress

Alfred Chung's avatar

Alfred Chung

Congrats to the 2018 Metasploit Community CTF Winners

Products and Tools

Congrats to the 2018 Metasploit Community CTF Winners

Caitlin Condon's avatar

Caitlin Condon

Metasploit Wrapup 11/30/18

Products and Tools

Metasploit Wrapup 11/30/18

Adam Cammack's avatar

Adam Cammack

Automation: The Ultimate Enabler for Threat Detection and Response

Detection and Response

Automation: The Ultimate Enabler for Threat Detection and Response

Eric Sun's avatar

Eric Sun

Deploying Kubernetes Across Multiple Clouds

Cloud and Devops Security

Deploying Kubernetes Across Multiple Clouds

David Mundy's avatar

David Mundy

How Retailers Can Protect Against Magecart This Black Friday and Holiday Season

Threat Research

How Retailers Can Protect Against Magecart This Black Friday and Holiday Season

boB Rudis's avatar

boB Rudis

Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options

Products and Tools

Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options

Teresa Copple's avatar

Teresa Copple

Metasploit Wrapup 11/16/18

Products and Tools

Metasploit Wrapup 11/16/18

Matthew Kienow's avatar

Matthew Kienow

5 Tips For Monitoring Network Traffic on Your Network

Products and Tools

5 Tips For Monitoring Network Traffic on Your Network

Rapid7's avatar

Rapid7

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Detection and Response

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Christie Ott's avatar

Christie Ott

Rolling with Your Logs, Part 2: Advanced Mode Searches

Detection and Response

Rolling with Your Logs, Part 2: Advanced Mode Searches

Teresa Copple's avatar

Teresa Copple