The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Patch Tuesday - March 2018

Exposure Management

Patch Tuesday - March 2018

Greg Wiseman's avatar

Greg Wiseman

CIS Critical Control 10: Data Recovery Capability

Security Operations

CIS Critical Control 10: Data Recovery Capability

Anna Nielsen's avatar

Anna Nielsen

Metasploit Wrapup 3/9/18

Products and Tools

Metasploit Wrapup 3/9/18

Pearce Barry's avatar

Pearce Barry

CIS Critical Control 9: Limitation and Control of Ports, Protocols, and Services

Exposure Management

CIS Critical Control 9: Limitation and Control of Ports, Protocols, and Services

Cindy Jones's avatar

Cindy Jones

Guest Post: Lurking in /lib

Industry Trends

Guest Post: Lurking in /lib

RageLtMan's avatar

RageLtMan

How to Scan Your Own Application with the InsightAppSec Free Trial

Products and Tools

How to Scan Your Own Application with the InsightAppSec Free Trial

Alfred Chung's avatar

Alfred Chung

Metasploit Wrapup 2/23/18

Products and Tools

Metasploit Wrapup 2/23/18

Jacob Robles's avatar

Jacob Robles

Making the Dream Work: Teaming with Dev for Safer Production Apps

Products and Tools

Making the Dream Work: Teaming with Dev for Safer Production Apps

Alfred Chung's avatar

Alfred Chung

Metasploit Wrapup 2/16/18

Products and Tools

Metasploit Wrapup 2/16/18

Pearce Barry's avatar

Pearce Barry

Tonight I'm gonna IR like it's 99 (days until GDPR)…

Exposure Management

Tonight I'm gonna IR like it's 99 (days until GDPR)…

Sam Humphries's avatar

Sam Humphries

Patch Tuesday - February 2018

Exposure Management

Patch Tuesday - February 2018

Greg Wiseman's avatar

Greg Wiseman

Coinhive: Making Other People’s Web Browsers Mine Cryptocurrency

Rapid7 Blog

Coinhive: Making Other People’s Web Browsers Mine Cryptocurrency

Rapid7's avatar

Rapid7

Why Managed Detection and Response Zeroes In On the Endpoint

Products and Tools

Why Managed Detection and Response Zeroes In On the Endpoint

Eric Sun's avatar

Eric Sun

HIPAA Security Compliance Fallacies (And How To Avoid Them)

Security Operations

HIPAA Security Compliance Fallacies (And How To Avoid Them)

kevinbeaver's avatar

kevinbeaver

Metasploit Wrapup 2/9/18

Products and Tools

Metasploit Wrapup 2/9/18

Sonny Gonzalez's avatar

Sonny Gonzalez

Metasploit Wrapup: Feb. 2, 2018

Products and Tools

Metasploit Wrapup: Feb. 2, 2018

Pearce Barry's avatar

Pearce Barry

Metasploit Wrapup: Jan. 26, 2018

Products and Tools

Metasploit Wrapup: Jan. 26, 2018

Pearce Barry's avatar

Pearce Barry

XSS Bug Reports Made Easy

Rapid7 Blog

XSS Bug Reports Made Easy

Rapid7's avatar

Rapid7

Vulnerability Management Year in Review, Part 3: Remediate

Exposure Management

Vulnerability Management Year in Review, Part 3: Remediate

Nathan Palanov's avatar

Nathan Palanov

How To Detect Unauthorized DNS Servers On Your Network

Detection and Response

How To Detect Unauthorized DNS Servers On Your Network

Rapid7's avatar

Rapid7

Metasploit Wrapup 1/19/18

Products and Tools

Metasploit Wrapup 1/19/18

Brent Cook's avatar

Brent Cook