The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrapup 2/16/18

Products and Tools

Metasploit Wrapup 2/16/18

Pearce Barry's avatar

Pearce Barry

Tonight I'm gonna IR like it's 99 (days until GDPR)…

Exposure Management

Tonight I'm gonna IR like it's 99 (days until GDPR)…

Sam Humphries's avatar

Sam Humphries

Patch Tuesday - February 2018

Exposure Management

Patch Tuesday - February 2018

Greg Wiseman's avatar

Greg Wiseman

Coinhive: Making Other People’s Web Browsers Mine Cryptocurrency

Rapid7 Blog

Coinhive: Making Other People’s Web Browsers Mine Cryptocurrency

Rapid7's avatar

Rapid7

Why Managed Detection and Response Zeroes In On the Endpoint

Products and Tools

Why Managed Detection and Response Zeroes In On the Endpoint

Eric Sun's avatar

Eric Sun

HIPAA Security Compliance Fallacies (And How To Avoid Them)

Security Operations

HIPAA Security Compliance Fallacies (And How To Avoid Them)

kevinbeaver's avatar

kevinbeaver

Metasploit Wrapup 2/9/18

Products and Tools

Metasploit Wrapup 2/9/18

Sonny Gonzalez's avatar

Sonny Gonzalez

Metasploit Wrapup: Feb. 2, 2018

Products and Tools

Metasploit Wrapup: Feb. 2, 2018

Pearce Barry's avatar

Pearce Barry

Metasploit Wrapup: Jan. 26, 2018

Products and Tools

Metasploit Wrapup: Jan. 26, 2018

Pearce Barry's avatar

Pearce Barry

XSS Bug Reports Made Easy

Rapid7 Blog

XSS Bug Reports Made Easy

Rapid7's avatar

Rapid7

Vulnerability Management Year in Review, Part 3: Remediate

Exposure Management

Vulnerability Management Year in Review, Part 3: Remediate

Nathan Palanov's avatar

Nathan Palanov

How To Detect Unauthorized DNS Servers On Your Network

Detection and Response

How To Detect Unauthorized DNS Servers On Your Network

Rapid7's avatar

Rapid7

Metasploit Wrapup 1/19/18

Products and Tools

Metasploit Wrapup 1/19/18

Brent Cook's avatar

Brent Cook

Think Like a Hacker: Going Beyond Network Security

Rapid7 Blog

Think Like a Hacker: Going Beyond Network Security

Rapid7's avatar

Rapid7

A RESTful API for InsightVM

Exposure Management

A RESTful API for InsightVM

Ken Mizota's avatar

Ken Mizota

3 Questions to Ask When Prioritizing Web Application Vulnerabilities

Exposure Management

3 Questions to Ask When Prioritizing Web Application Vulnerabilities

Alfred Chung's avatar

Alfred Chung

Taking a Message-Based Approach to Logging

Products and Tools

Taking a Message-Based Approach to Logging

Robert Reselman's avatar

Robert Reselman

Metasploit Wrapup: Jan. 12, 2018

Products and Tools

Metasploit Wrapup: Jan. 12, 2018

Aaron Soto's avatar

Aaron Soto

4 Differences Between Network Security & Application Security

Detection and Response

4 Differences Between Network Security & Application Security

Alfred Chung's avatar

Alfred Chung

How to Choose a Security Orchestration and Automation Platform

Security Operations

How to Choose a Security Orchestration and Automation Platform

Rapid7's avatar

Rapid7

GDPR Preparation Checklist: January – Teach and Tidy

Exposure Management

GDPR Preparation Checklist: January – Teach and Tidy

Sam Humphries's avatar

Sam Humphries