The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Pen Test, Part 2: How Just One Flaw Helped Us Beat the Unbeatable Network

Exposure Management

Pen Test, Part 2: How Just One Flaw Helped Us Beat the Unbeatable Network

Matt Hand's avatar

Matt Hand

Serverless and the OWASP Top 10

Rapid7 Blog

Serverless and the OWASP Top 10

Rapid7's avatar

Rapid7

Metasploit Wrapup 9/7/18

Products and Tools

Metasploit Wrapup 9/7/18

Adam Cammack's avatar

Adam Cammack

External Metasploit Modules: The Gift that Keeps on Slithering

Products and Tools

External Metasploit Modules: The Gift that Keeps on Slithering

Adam Cammack's avatar

Adam Cammack

This One Time on a Pen Test, Part 1: Curiosity Didn’t Kill the Cat—Honesty Did

Exposure Management

This One Time on a Pen Test, Part 1: Curiosity Didn’t Kill the Cat—Honesty Did

Aaron Herndon's avatar

Aaron Herndon

Metasploit Wrapup: 8/31/18

Products and Tools

Metasploit Wrapup: 8/31/18

Matthew Kienow's avatar

Matthew Kienow

Under the Hoodie: Which Vulns Are Being Exploited by Attackers (and Our Pen Testers) in 2018?

Exposure Management

Under the Hoodie: Which Vulns Are Being Exploited by Attackers (and Our Pen Testers) in 2018?

Justin Buchanan's avatar

Justin Buchanan

5 Ways RASP Will Make Your Pentest Painless

Rapid7 Blog

5 Ways RASP Will Make Your Pentest Painless

Rapid7's avatar

Rapid7

How to Set Up Your Security Operations Center (SOC) for Success

Security Operations

How to Set Up Your Security Operations Center (SOC) for Success

Wade Woolwine's avatar

Wade Woolwine

Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 2)

Detection and Response

Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 2)

Vivian Ma's avatar

Vivian Ma

Lessons and Takeaways from CTIA’s Recently Released IoT Security Certification Program

Detection and Response

Lessons and Takeaways from CTIA’s Recently Released IoT Security Certification Program

Deral Heiland's avatar

Deral Heiland

Metasploit Wrapup: 8/24/18

Products and Tools

Metasploit Wrapup: 8/24/18

Shelby Pace's avatar

Shelby Pace

Enhancing IoT Security Through Research Partnerships

Threat Research

Enhancing IoT Security Through Research Partnerships

Andrew Bindner's avatar

Andrew Bindner

Cross-Site Scripting (XSS) Can Steal Payment Information from Payment Processors

Rapid7 Blog

Cross-Site Scripting (XSS) Can Steal Payment Information from Payment Processors

Rapid7's avatar

Rapid7

What's Going on in Production Application Security 2018

Rapid7 Blog

What's Going on in Production Application Security 2018

Rapid7's avatar

Rapid7

Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 1)

Detection and Response

Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 1)

Vivian Ma's avatar

Vivian Ma

Password Tips from a Pen Tester: Taking the Predictability Out of Common Password Patterns

Exposure Management

Password Tips from a Pen Tester: Taking the Predictability Out of Common Password Patterns

Patrick Laverty's avatar

Patrick Laverty

CIS Critical Security Control 20: Measure Your Security Standing with Penetration Tests and Red Team Exercises

Exposure Management

CIS Critical Security Control 20: Measure Your Security Standing with Penetration Tests and Red Team Exercises

Brian Carey's avatar

Brian Carey

Metasploit Wrapup: 8/17/18

Exposure Management

Metasploit Wrapup: 8/17/18

Brent Cook's avatar

Brent Cook

The Top Threat Actors Targeting Financial Services Organizations

Industry Trends

The Top Threat Actors Targeting Financial Services Organizations

Itay Kozuch's avatar

Itay Kozuch

Analysis of the Ticketmaster Breach

Rapid7 Blog

Analysis of the Ticketmaster Breach

Rapid7's avatar

Rapid7