The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Password Tips From a Pen Tester: Common Patterns Exposed

Threat Research

Password Tips From a Pen Tester: Common Patterns Exposed

Patrick Laverty's avatar

Patrick Laverty

R7-2018-15 | CVE-2018-5553: Crestron DGE-100 Console Command Injection (FIXED)

Vulnerabilities and Exploits

R7-2018-15 | CVE-2018-5553: Crestron DGE-100 Console Command Injection (FIXED)

Sam Huckins's avatar

Sam Huckins

Metasploit Wrapup 6/8/18

Products and Tools

Metasploit Wrapup 6/8/18

Adam Cammack's avatar

Adam Cammack

Announcement: End of Life for Metasploit Express Edition

Products and Tools

Announcement: End of Life for Metasploit Express Edition

Cody Pierce's avatar

Cody Pierce

Metasploit Wrapup 6/1/18

Products and Tools

Metasploit Wrapup 6/1/18

James Barnett's avatar

James Barnett

Managed Threat Detection and Response Vendors: Questions You Need to Ask

Products and Tools

Managed Threat Detection and Response Vendors: Questions You Need to Ask

Wade Woolwine's avatar

Wade Woolwine

How to Streamline Your Vulnerability Remediation Workflows with InsightVM Projects

Products and Tools

How to Streamline Your Vulnerability Remediation Workflows with InsightVM Projects

Jesika McEvoy's avatar

Jesika McEvoy

Metasploit Wrapup 5/25/18

Products and Tools

Metasploit Wrapup 5/25/18

Aaron Soto's avatar

Aaron Soto

What the Heck is Drive-By Cryptomining?

Rapid7 Blog

What the Heck is Drive-By Cryptomining?

Rapid7's avatar

Rapid7

How to Build Your Own Caller ID Spoofer: Part 1

Exposure Management

How to Build Your Own Caller ID Spoofer: Part 1

Jonathan Stines's avatar

Jonathan Stines

Metasploit Wrapup 5/18/18

Products and Tools

Metasploit Wrapup 5/18/18

Brendan Watters's avatar

Brendan Watters

Whiteboard Wednesday: The Two Components of Phishing Protection Your Security Strategy Needs

Detection and Response

Whiteboard Wednesday: The Two Components of Phishing Protection Your Security Strategy Needs

Vivian Ma's avatar

Vivian Ma

Rapid7 Quarterly Threat Report: 2018 Q1

Detection and Response

Rapid7 Quarterly Threat Report: 2018 Q1

Rebekah Brown's avatar

Rebekah Brown

Metasploit Wrapup: 5/11/18

Products and Tools

Metasploit Wrapup: 5/11/18

Jacob Robles's avatar

Jacob Robles

Unifying Security Data: How to Streamline Endpoint Detection and Response

Detection and Response

Unifying Security Data: How to Streamline Endpoint Detection and Response

Christie Ott's avatar

Christie Ott

Password Tips From a Pen Tester: 3 Passwords to Eliminate

Exposure Management

Password Tips From a Pen Tester: 3 Passwords to Eliminate

Patrick Laverty's avatar

Patrick Laverty

Critical Control 16: Account Monitoring and Control

Security Operations

Critical Control 16: Account Monitoring and Control

Michael Cole's avatar

Michael Cole

Metasploit Wrapup 5/4/18

Products and Tools

Metasploit Wrapup 5/4/18

Matthew Kienow's avatar

Matthew Kienow

Hiding Metasploit Shellcode to Evade Windows Defender

Exposure Management

Hiding Metasploit Shellcode to Evade Windows Defender

Wei Chen's avatar

Wei Chen

CVE 100K: A Big, Round Number

Exposure Management

CVE 100K: A Big, Round Number

Tod Beardsley's avatar

Tod Beardsley

CVE 100K: By The Numbers

Exposure Management

CVE 100K: By The Numbers

boB Rudis's avatar

boB Rudis