The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Patch Tuesday - January 2018

Exposure Management

Patch Tuesday - January 2018

Greg Wiseman's avatar

Greg Wiseman

Metasploit Wrapup 1/5/18

Products and Tools

Metasploit Wrapup 1/5/18

Dev Mohanty's avatar

Dev Mohanty

Vulnerability Management Year in Review, Part 1: Collect

Security Operations

Vulnerability Management Year in Review, Part 1: Collect

Ken Mizota's avatar

Ken Mizota

HaXmas Review: A Year of Patch Tuesdays

Exposure Management

HaXmas Review: A Year of Patch Tuesdays

Greg Wiseman's avatar

Greg Wiseman

12 Memorable Metasploit Moments of 2017

Products and Tools

12 Memorable Metasploit Moments of 2017

Brent Cook's avatar

Brent Cook

An Evaluation of the North Pole’s Password Security Posture

Security Operations

An Evaluation of the North Pole’s Password Security Posture

Jonathan Stines's avatar

Jonathan Stines

Regifting Python in Metasploit

Products and Tools

Regifting Python in Metasploit

Adam Cammack's avatar

Adam Cammack

Forget The Presents: HaXmas Is All About The [Gift] Certificates

Exposure Management

Forget The Presents: HaXmas Is All About The [Gift] Certificates

boB Rudis's avatar

boB Rudis

Uses For Tech of HaXmas Past

Exposure Management

Uses For Tech of HaXmas Past

Andrew Bindner's avatar

Andrew Bindner

HaXmas: The True Meaning(s) of Metasploit

Products and Tools

HaXmas: The True Meaning(s) of Metasploit

Tod Beardsley's avatar

Tod Beardsley

On the Zero-eth Day of HaXmas...

Exposure Management

On the Zero-eth Day of HaXmas...

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrapup: Dec. 22, 2017

Products and Tools

Metasploit Wrapup: Dec. 22, 2017

Pearce Barry's avatar

Pearce Barry

Protecting Your Web Site from the Doubleclick XSS Vulnerability

Rapid7 Blog

Protecting Your Web Site from the Doubleclick XSS Vulnerability

Rapid7's avatar

Rapid7

Prepare for Battle: Let’s Build an Incident Response Plan (Part 4)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 4)

Eric Sun's avatar

Eric Sun

NIST Cyber Framework Updated With Coordinated Vuln Disclosure Processes

Vulnerabilities and Exploits

NIST Cyber Framework Updated With Coordinated Vuln Disclosure Processes

Harley Geiger's avatar

Harley Geiger

R7-2017-25: Cambium ePMP and cnPilot Multiple Vulnerabilities

Vulnerabilities and Exploits

R7-2017-25: Cambium ePMP and cnPilot Multiple Vulnerabilities

Tod Beardsley's avatar

Tod Beardsley

MDR and GDPR: More than a lot of letters

Products and Tools

MDR and GDPR: More than a lot of letters

Kimberlee Bachman's avatar

Kimberlee Bachman

Metasploit Wrapup: Dec. 15, 2017

Products and Tools

Metasploit Wrapup: Dec. 15, 2017

Matthew Kienow's avatar

Matthew Kienow

Prepare for Battle: Let’s Build an Incident Response Plan (Part 3)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 3)

Eric Sun's avatar

Eric Sun

FCC Repeals Net Neutrality: What Now?

Industry Trends

FCC Repeals Net Neutrality: What Now?

Harley Geiger's avatar

Harley Geiger

Attention Humans: The ROBOT Attack

Industry Trends

Attention Humans: The ROBOT Attack

Tod Beardsley's avatar

Tod Beardsley