The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

How to Automate Identifying and Take Down Malicious Social Media Profiles

Vulnerabilities and Exploits

How to Automate Identifying and Take Down Malicious Social Media Profiles

Omer Shahak's avatar

Omer Shahak

Metasploit Wrapup 7/6/18

Exposure Management

Metasploit Wrapup 7/6/18

Jeffrey Martin's avatar

Jeffrey Martin

15 Technologies and Tools Commonly Used in Dark Web Black Markets

Exposure Management

15 Technologies and Tools Commonly Used in Dark Web Black Markets

Itay Kozuch's avatar

Itay Kozuch

Metasploit Wrapup: 6/29/18

Products and Tools

Metasploit Wrapup: 6/29/18

Matthew Kienow's avatar

Matthew Kienow

Do You Need Coding Resources on Your Security Team?

Detection and Response

Do You Need Coding Resources on Your Security Team?

Jen Andre's avatar

Jen Andre

Analyzing Activity on Kubernetes Ports: Potential Backdooring Through the Kubelet API

Cloud and Devops Security

Analyzing Activity on Kubernetes Ports: Potential Backdooring Through the Kubelet API

Shan Sikdar's avatar

Shan Sikdar

Why Mastering Application Security Basics Matters

Security Operations

Why Mastering Application Security Basics Matters

Alfred Chung's avatar

Alfred Chung

Deception Technology in InsightIDR: Setting Up  Honeypots

Detection and Response

Deception Technology in InsightIDR: Setting Up Honeypots

Aneel Dadani's avatar

Aneel Dadani

Metasploit Wrapup: 6/22/18

Products and Tools

Metasploit Wrapup: 6/22/18

Brendan Watters's avatar

Brendan Watters

Top Three Questions to ask Security Orchestration and Automation Vendors

Security Operations

Top Three Questions to ask Security Orchestration and Automation Vendors

Jen Andre's avatar

Jen Andre

Deception Technology in InsightIDR: Setting Up Honey Users

Detection and Response

Deception Technology in InsightIDR: Setting Up Honey Users

Matthew Graham's avatar

Matthew Graham

Why Bow Valley College Gives Rapid7 InsightVM High Marks for Vulnerability Management

Exposure Management

Why Bow Valley College Gives Rapid7 InsightVM High Marks for Vulnerability Management

James Cairns's avatar

James Cairns

Security Impact of Easily Accessible 
UART on IoT Technology

Threat Research

Security Impact of Easily Accessible UART on IoT Technology

Deral Heiland's avatar

Deral Heiland

Metasploit Wrapup: 6/15/18

Products and Tools

Metasploit Wrapup: 6/15/18

Sonny Gonzalez's avatar

Sonny Gonzalez

How to Create a Secure and Portable Kali Installation

Security Operations

How to Create a Secure and Portable Kali Installation

Bo Weaver's avatar

Bo Weaver

A Common Retailer Dark Web Profile: What We Found in Our Search

Exposure Management

A Common Retailer Dark Web Profile: What We Found in Our Search

Orin Mor's avatar

Orin Mor

Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy.

Detection and Response

Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy.

Eric Sun's avatar

Eric Sun

New InsightAppSec Releases: Compliance Reports and the AppSec Toolkit

Products and Tools

New InsightAppSec Releases: Compliance Reports and the AppSec Toolkit

Mark Hamill's avatar

Mark Hamill

How to detect SMBv1 scanning and SMBv1 established connections

Detection and Response

How to detect SMBv1 scanning and SMBv1 established connections

Rapid7's avatar

Rapid7

How Security Orchestration and Automation Will Unite Infosec

Products and Tools

How Security Orchestration and Automation Will Unite Infosec

Jen Andre's avatar

Jen Andre

Patch Tuesday - June 2018

Exposure Management

Patch Tuesday - June 2018

Greg Wiseman's avatar

Greg Wiseman