The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

The British Airways Breach: PCI is Not Enough

Exposure Management

The British Airways Breach: PCI is Not Enough

Rapid7's avatar

Rapid7

Introducing Security Orchestration and Automation (SOAR) on the Rapid7 Insight Platform

Security Operations

Introducing Security Orchestration and Automation (SOAR) on the Rapid7 Insight Platform

Jen Andre's avatar

Jen Andre

Detecting Inbound RDP Activity From External Clients

Detection and Response

Detecting Inbound RDP Activity From External Clients

Rapid7's avatar

Rapid7

Rapid7 Threat Intelligence Book Club: ‘Countdown to Zero Day’ Recap

Exposure Management

Rapid7 Threat Intelligence Book Club: ‘Countdown to Zero Day’ Recap

Rapid7's avatar

Rapid7

Pen Test, Part 3: Jumping a Fence and Donning a Disguise

Exposure Management

Pen Test, Part 3: Jumping a Fence and Donning a Disguise

Leon Johnson's avatar

Leon Johnson

Metasploit Wrapup 9/14/18

Products and Tools

Metasploit Wrapup 9/14/18

Sonny Gonzalez's avatar

Sonny Gonzalez

Do You Know Your AppSec ROI?

Rapid7 Blog

Do You Know Your AppSec ROI?

Rapid7's avatar

Rapid7

How to Identify and Prioritize Gaps with the Cybersecurity Maturity Assessment, Post-2018 'Under the Hoodie'

Exposure Management

How to Identify and Prioritize Gaps with the Cybersecurity Maturity Assessment, Post-2018 'Under the Hoodie'

Scott King's avatar

Scott King

HUMINT: The Riskiest (and Most Valuable) Form of Intelligence Gathering

Threat Research

HUMINT: The Riskiest (and Most Valuable) Form of Intelligence Gathering

Nathan Teplow's avatar

Nathan Teplow

Patch Tuesday - September 2018

Exposure Management

Patch Tuesday - September 2018

Greg Wiseman's avatar

Greg Wiseman

Pen Test, Part 2: How Just One Flaw Helped Us Beat the Unbeatable Network

Exposure Management

Pen Test, Part 2: How Just One Flaw Helped Us Beat the Unbeatable Network

Matt Hand's avatar

Matt Hand

Serverless and the OWASP Top 10

Rapid7 Blog

Serverless and the OWASP Top 10

Rapid7's avatar

Rapid7

Metasploit Wrapup 9/7/18

Products and Tools

Metasploit Wrapup 9/7/18

Adam Cammack's avatar

Adam Cammack

External Metasploit Modules: The Gift that Keeps on Slithering

Products and Tools

External Metasploit Modules: The Gift that Keeps on Slithering

Adam Cammack's avatar

Adam Cammack

This One Time on a Pen Test, Part 1: Curiosity Didn’t Kill the Cat—Honesty Did

Exposure Management

This One Time on a Pen Test, Part 1: Curiosity Didn’t Kill the Cat—Honesty Did

Aaron Herndon's avatar

Aaron Herndon

Metasploit Wrapup: 8/31/18

Products and Tools

Metasploit Wrapup: 8/31/18

Matthew Kienow's avatar

Matthew Kienow

Under the Hoodie: Which Vulns Are Being Exploited by Attackers (and Our Pen Testers) in 2018?

Exposure Management

Under the Hoodie: Which Vulns Are Being Exploited by Attackers (and Our Pen Testers) in 2018?

Justin Buchanan's avatar

Justin Buchanan

5 Ways RASP Will Make Your Pentest Painless

Rapid7 Blog

5 Ways RASP Will Make Your Pentest Painless

Rapid7's avatar

Rapid7

How to Set Up Your Security Operations Center (SOC) for Success

Security Operations

How to Set Up Your Security Operations Center (SOC) for Success

Wade Woolwine's avatar

Wade Woolwine

Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 2)

Detection and Response

Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 2)

Vivian Ma's avatar

Vivian Ma

Lessons and Takeaways from CTIA’s Recently Released IoT Security Certification Program

Detection and Response

Lessons and Takeaways from CTIA’s Recently Released IoT Security Certification Program

Deral Heiland's avatar

Deral Heiland