The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Deception Technology in InsightIDR: Setting Up  Honeypots

Detection and Response

Deception Technology in InsightIDR: Setting Up Honeypots

Aneel Dadani's avatar

Aneel Dadani

Metasploit Wrapup: 6/22/18

Products and Tools

Metasploit Wrapup: 6/22/18

Brendan Watters's avatar

Brendan Watters

Top Three Questions to ask Security Orchestration and Automation Vendors

Security Operations

Top Three Questions to ask Security Orchestration and Automation Vendors

Jen Andre's avatar

Jen Andre

Deception Technology in InsightIDR: Setting Up Honey Users

Detection and Response

Deception Technology in InsightIDR: Setting Up Honey Users

Matthew Graham's avatar

Matthew Graham

Why Bow Valley College Gives Rapid7 InsightVM High Marks for Vulnerability Management

Exposure Management

Why Bow Valley College Gives Rapid7 InsightVM High Marks for Vulnerability Management

James Cairns's avatar

James Cairns

Security Impact of Easily Accessible 
UART on IoT Technology

Threat Research

Security Impact of Easily Accessible UART on IoT Technology

Deral Heiland's avatar

Deral Heiland

Metasploit Wrapup: 6/15/18

Products and Tools

Metasploit Wrapup: 6/15/18

Sonny Gonzalez's avatar

Sonny Gonzalez

How to Create a Secure and Portable Kali Installation

Security Operations

How to Create a Secure and Portable Kali Installation

Bo Weaver's avatar

Bo Weaver

A Common Retailer Dark Web Profile: What We Found in Our Search

Exposure Management

A Common Retailer Dark Web Profile: What We Found in Our Search

Orin Mor's avatar

Orin Mor

Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy.

Detection and Response

Phishing Attacks Duping Your Users? Here’s a Better Anti-Phishing Strategy.

Eric Sun's avatar

Eric Sun

New InsightAppSec Releases: Compliance Reports and the AppSec Toolkit

Products and Tools

New InsightAppSec Releases: Compliance Reports and the AppSec Toolkit

Mark Hamill's avatar

Mark Hamill

How to detect SMBv1 scanning and SMBv1 established connections

Detection and Response

How to detect SMBv1 scanning and SMBv1 established connections

Rapid7's avatar

Rapid7

How Security Orchestration and Automation Will Unite Infosec

Products and Tools

How Security Orchestration and Automation Will Unite Infosec

Jen Andre's avatar

Jen Andre

Patch Tuesday - June 2018

Exposure Management

Patch Tuesday - June 2018

Greg Wiseman's avatar

Greg Wiseman

Password Tips From a Pen Tester: Common Patterns Exposed

Threat Research

Password Tips From a Pen Tester: Common Patterns Exposed

Patrick Laverty's avatar

Patrick Laverty

R7-2018-15 | CVE-2018-5553: Crestron DGE-100 Console Command Injection (FIXED)

Vulnerabilities and Exploits

R7-2018-15 | CVE-2018-5553: Crestron DGE-100 Console Command Injection (FIXED)

Sam Huckins's avatar

Sam Huckins

Metasploit Wrapup 6/8/18

Products and Tools

Metasploit Wrapup 6/8/18

Adam Cammack's avatar

Adam Cammack

Announcement: End of Life for Metasploit Express Edition

Products and Tools

Announcement: End of Life for Metasploit Express Edition

Cody Pierce's avatar

Cody Pierce

Metasploit Wrapup 6/1/18

Products and Tools

Metasploit Wrapup 6/1/18

James Barnett's avatar

James Barnett

Managed Threat Detection and Response Vendors: Questions You Need to Ask

Products and Tools

Managed Threat Detection and Response Vendors: Questions You Need to Ask

Wade Woolwine's avatar

Wade Woolwine

How to Streamline Your Vulnerability Remediation Workflows with InsightVM Projects

Products and Tools

How to Streamline Your Vulnerability Remediation Workflows with InsightVM Projects

Jesika McEvoy's avatar

Jesika McEvoy