The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrapup: 7/13/18

Products and Tools

Metasploit Wrapup: 7/13/18

William Vu's avatar

William Vu

Your Black Hat 2018 Survival Guide

Rapid7 Blog

Your Black Hat 2018 Survival Guide

Rapid7's avatar

Rapid7

How to Build Your Own Caller ID Spoofer: Part 2

Exposure Management

How to Build Your Own Caller ID Spoofer: Part 2

Jonathan Stines's avatar

Jonathan Stines

Building a Tech Stack to Enable Security Orchestration and Automation

Security Operations

Building a Tech Stack to Enable Security Orchestration and Automation

Tyler Terenzoni's avatar

Tyler Terenzoni

How to Automate Identifying and Take Down Malicious Social Media Profiles

Vulnerabilities and Exploits

How to Automate Identifying and Take Down Malicious Social Media Profiles

Omer Shahak's avatar

Omer Shahak

Metasploit Wrapup 7/6/18

Exposure Management

Metasploit Wrapup 7/6/18

Jeffrey Martin's avatar

Jeffrey Martin

15 Technologies and Tools Commonly Used in Dark Web Black Markets

Exposure Management

15 Technologies and Tools Commonly Used in Dark Web Black Markets

Itay Kozuch's avatar

Itay Kozuch

Metasploit Wrapup: 6/29/18

Products and Tools

Metasploit Wrapup: 6/29/18

Matthew Kienow's avatar

Matthew Kienow

Do You Need Coding Resources on Your Security Team?

Detection and Response

Do You Need Coding Resources on Your Security Team?

Jen Andre's avatar

Jen Andre

Analyzing Activity on Kubernetes Ports: Potential Backdooring Through the Kubelet API

Cloud and Devops Security

Analyzing Activity on Kubernetes Ports: Potential Backdooring Through the Kubelet API

Shan Sikdar's avatar

Shan Sikdar

Why Mastering Application Security Basics Matters

Security Operations

Why Mastering Application Security Basics Matters

Alfred Chung's avatar

Alfred Chung

Deception Technology in InsightIDR: Setting Up  Honeypots

Detection and Response

Deception Technology in InsightIDR: Setting Up Honeypots

Aneel Dadani's avatar

Aneel Dadani

Metasploit Wrapup: 6/22/18

Products and Tools

Metasploit Wrapup: 6/22/18

Brendan Watters's avatar

Brendan Watters

Top Three Questions to ask Security Orchestration and Automation Vendors

Security Operations

Top Three Questions to ask Security Orchestration and Automation Vendors

Jen Andre's avatar

Jen Andre

Deception Technology in InsightIDR: Setting Up Honey Users

Detection and Response

Deception Technology in InsightIDR: Setting Up Honey Users

Matthew Graham's avatar

Matthew Graham

Why Bow Valley College Gives Rapid7 InsightVM High Marks for Vulnerability Management

Exposure Management

Why Bow Valley College Gives Rapid7 InsightVM High Marks for Vulnerability Management

James Cairns's avatar

James Cairns

Security Impact of Easily Accessible 
UART on IoT Technology

Threat Research

Security Impact of Easily Accessible UART on IoT Technology

Deral Heiland's avatar

Deral Heiland

Metasploit Wrapup: 6/15/18

Products and Tools

Metasploit Wrapup: 6/15/18

Sonny Gonzalez's avatar

Sonny Gonzalez

How to Create a Secure and Portable Kali Installation

Security Operations

How to Create a Secure and Portable Kali Installation

Bo Weaver's avatar

Bo Weaver

A Common Retailer Dark Web Profile: What We Found in Our Search

Exposure Management

A Common Retailer Dark Web Profile: What We Found in Our Search

Orin Mor's avatar

Orin Mor

Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy.

Detection and Response

Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy.

Eric Sun's avatar

Eric Sun