The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrapup 4/20/18

Products and Tools

Metasploit Wrapup 4/20/18

Aaron Soto's avatar

Aaron Soto

Should Security Teams Use CSP Nonces to Better Comply with PCI?

Rapid7 Blog

Should Security Teams Use CSP Nonces to Better Comply with PCI?

Rapid7's avatar

Rapid7

How to Remediate Vulnerabilities Across Multiple Offices

Products and Tools

How to Remediate Vulnerabilities Across Multiple Offices

Nathan Palanov's avatar

Nathan Palanov

Attacker Behavior Analytics: How SIEM Detects Unknown Threats

Detection and Response

Attacker Behavior Analytics: How SIEM Detects Unknown Threats

Eric Sun's avatar

Eric Sun

Georgia should not authorize "hack back"

Industry Trends

Georgia should not authorize "hack back"

Harley Geiger's avatar

Harley Geiger

Metasploit Wrapup 4/13/18

Products and Tools

Metasploit Wrapup 4/13/18

Jacob Robles's avatar

Jacob Robles

Threat Intel Book Club: The Cuckoo's Egg wrap-up

Threat Research

Threat Intel Book Club: The Cuckoo's Egg wrap-up

Caitlin Condon's avatar

Caitlin Condon

How DevOps Can Use Quality Gates for Security Checks

Security Operations

How DevOps Can Use Quality Gates for Security Checks

Alfred Chung's avatar

Alfred Chung

Patch Tuesday - April 2018

Exposure Management

Patch Tuesday - April 2018

Greg Wiseman's avatar

Greg Wiseman

Shoring Up the Defenses Together: 2018Q1 Wrap-Up

Vulnerabilities and Exploits

Shoring Up the Defenses Together: 2018Q1 Wrap-Up

Sam Huckins's avatar

Sam Huckins

CIS Critical Security Control 13:  Data Protection Explained

Security Operations

CIS Critical Security Control 13: Data Protection Explained

Michael Cole's avatar

Michael Cole

Metasploit Wrapup 4/7/18

Products and Tools

Metasploit Wrapup 4/7/18

Brendan Watters's avatar

Brendan Watters

Metasploit Wrapup 4/2/18

Products and Tools

Metasploit Wrapup 4/2/18

Brent Cook's avatar

Brent Cook

CIS Critical Control 12: Boundary Defense Explained

Security Operations

CIS Critical Control 12: Boundary Defense Explained

Christy Draicchio's avatar

Christy Draicchio

Actually, Grindr is Fine: FUD and Security Reporting

Industry Trends

Actually, Grindr is Fine: FUD and Security Reporting

Tod Beardsley's avatar

Tod Beardsley

Cisco Smart Install (SMI) Remote Code Execution

Exposure Management

Cisco Smart Install (SMI) Remote Code Execution

boB Rudis's avatar

boB Rudis

How to detect weak SSL/TLS encryption on your network

Detection and Response

How to detect weak SSL/TLS encryption on your network

Rapid7's avatar

Rapid7

3 Ways to Accelerate Web App Security Testing

Products and Tools

3 Ways to Accelerate Web App Security Testing

Alfred Chung's avatar

Alfred Chung

CIS Critical Control 11: Secure Configurations for Network Devices

Security Operations

CIS Critical Control 11: Secure Configurations for Network Devices

Jason Beatty's avatar

Jason Beatty

Metasploit Wrapup 3/23/18

Products and Tools

Metasploit Wrapup 3/23/18

Brendan Watters's avatar

Brendan Watters

How to detect new server ports in use on your network

Detection and Response

How to detect new server ports in use on your network

Rapid7's avatar

Rapid7