The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrapup: 8/24/18

Products and Tools

Metasploit Wrapup: 8/24/18

Shelby Pace's avatar

Shelby Pace

Enhancing IoT Security Through Research Partnerships

Threat Research

Enhancing IoT Security Through Research Partnerships

Andrew Bindner's avatar

Andrew Bindner

Cross-Site Scripting (XSS) Can Steal Payment Information from Payment Processors

Rapid7 Blog

Cross-Site Scripting (XSS) Can Steal Payment Information from Payment Processors

Rapid7's avatar

Rapid7

What's Going on in Production Application Security 2018

Rapid7 Blog

What's Going on in Production Application Security 2018

Rapid7's avatar

Rapid7

Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 1)

Detection and Response

Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 1)

Vivian Ma's avatar

Vivian Ma

Password Tips from a Pen Tester: Taking the Predictability Out of Common Password Patterns

Exposure Management

Password Tips from a Pen Tester: Taking the Predictability Out of Common Password Patterns

Patrick Laverty's avatar

Patrick Laverty

CIS Critical Security Control 20: Measure Your Security Standing with Penetration Tests and Red Team Exercises

Exposure Management

CIS Critical Security Control 20: Measure Your Security Standing with Penetration Tests and Red Team Exercises

Brian Carey's avatar

Brian Carey

Metasploit Wrapup: 8/17/18

Exposure Management

Metasploit Wrapup: 8/17/18

Brent Cook's avatar

Brent Cook

The Top Threat Actors Targeting Financial Services Organizations

Industry Trends

The Top Threat Actors Targeting Financial Services Organizations

Itay Kozuch's avatar

Itay Kozuch

Analysis of the Ticketmaster Breach

Rapid7 Blog

Analysis of the Ticketmaster Breach

Rapid7's avatar

Rapid7

Address the NAIC Insurance Data Security Model Law

Exposure Management

Address the NAIC Insurance Data Security Model Law

Eric Sun's avatar

Eric Sun

Scan Management with InsightAppSec: There’s More to Application Security than Long Lists of Vulnerabilities

Exposure Management

Scan Management with InsightAppSec: There’s More to Application Security than Long Lists of Vulnerabilities

Mark Hamill's avatar

Mark Hamill

A Tale of Security Summer Camp: Rapid7's 2018 Recap of Black Hat and Beyond

Rapid7 Blog

A Tale of Security Summer Camp: Rapid7's 2018 Recap of Black Hat and Beyond

Gwen Betts's avatar

Gwen Betts

Patch Tuesday - August 2018

Exposure Management

Patch Tuesday - August 2018

Greg Wiseman's avatar

Greg Wiseman

CIS Critical Security Control 19: Steps for Crafting an Efficient Incident Response and Management Strategy

Detection and Response

CIS Critical Security Control 19: Steps for Crafting an Efficient Incident Response and Management Strategy

Christy Draicchio's avatar

Christy Draicchio

Metasploit Wrapup 8/10/18

Products and Tools

Metasploit Wrapup 8/10/18

James Barnett's avatar

James Barnett

CIS Critical Security Control 18: Breaking Down the Control Chaos of Application Software Security

Exposure Management

CIS Critical Security Control 18: Breaking Down the Control Chaos of Application Software Security

Rapid7's avatar

Rapid7

Metasploit Wrapup 8/3/18

Products and Tools

Metasploit Wrapup 8/3/18

Wei Chen's avatar

Wei Chen

Major Carding Site Replacement: How Altenen.nz Rose From the Ashes of Altenen.com

Exposure Management

Major Carding Site Replacement: How Altenen.nz Rose From the Ashes of Altenen.com

Orin Mor's avatar

Orin Mor

CIS Critical Security Control 17: Some Assembly Required for Your Security Awareness and Training Program

Exposure Management

CIS Critical Security Control 17: Some Assembly Required for Your Security Awareness and Training Program

Brian Carey's avatar

Brian Carey

Metasploit Wrapup: 7/27/18

Products and Tools

Metasploit Wrapup: 7/27/18

Aaron Soto's avatar

Aaron Soto