The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Forget The Presents: HaXmas Is All About The [Gift] Certificates

Exposure Management

Forget The Presents: HaXmas Is All About The [Gift] Certificates

boB Rudis's avatar

boB Rudis

Uses For Tech of HaXmas Past

Exposure Management

Uses For Tech of HaXmas Past

Andrew Bindner's avatar

Andrew Bindner

HaXmas: The True Meaning(s) of Metasploit

Products and Tools

HaXmas: The True Meaning(s) of Metasploit

Tod Beardsley's avatar

Tod Beardsley

On the Zero-eth Day of HaXmas...

Exposure Management

On the Zero-eth Day of HaXmas...

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrapup: Dec. 22, 2017

Products and Tools

Metasploit Wrapup: Dec. 22, 2017

Pearce Barry's avatar

Pearce Barry

Protecting Your Web Site from the Doubleclick XSS Vulnerability

Rapid7 Blog

Protecting Your Web Site from the Doubleclick XSS Vulnerability

Rapid7's avatar

Rapid7

Prepare for Battle: Let’s Build an Incident Response Plan (Part 4)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 4)

Eric Sun's avatar

Eric Sun

NIST Cyber Framework Updated With Coordinated Vuln Disclosure Processes

Vulnerabilities and Exploits

NIST Cyber Framework Updated With Coordinated Vuln Disclosure Processes

Harley Geiger's avatar

Harley Geiger

R7-2017-25: Cambium ePMP and cnPilot Multiple Vulnerabilities

Vulnerabilities and Exploits

R7-2017-25: Cambium ePMP and cnPilot Multiple Vulnerabilities

Tod Beardsley's avatar

Tod Beardsley

MDR and GDPR: More than a lot of letters

Products and Tools

MDR and GDPR: More than a lot of letters

Kimberlee Bachman's avatar

Kimberlee Bachman

Metasploit Wrapup: Dec. 15, 2017

Products and Tools

Metasploit Wrapup: Dec. 15, 2017

Matthew Kienow's avatar

Matthew Kienow

Prepare for Battle: Let’s Build an Incident Response Plan (Part 3)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 3)

Eric Sun's avatar

Eric Sun

FCC Repeals Net Neutrality: What Now?

Industry Trends

FCC Repeals Net Neutrality: What Now?

Harley Geiger's avatar

Harley Geiger

Attention Humans: The ROBOT Attack

Industry Trends

Attention Humans: The ROBOT Attack

Tod Beardsley's avatar

Tod Beardsley

Creating a Risk-Based Vulnerability Management Program for GDPR with InsightVM

Products and Tools

Creating a Risk-Based Vulnerability Management Program for GDPR with InsightVM

Nathan Palanov's avatar

Nathan Palanov

6 Best Practices for Effective IT Troubleshooting

Detection and Response

6 Best Practices for Effective IT Troubleshooting

Robert Reselman's avatar

Robert Reselman

Patch Tuesday - December 2017

Exposure Management

Patch Tuesday - December 2017

Greg Wiseman's avatar

Greg Wiseman

The Magic Behind Managed Application Security Services

Cloud and Devops Security

The Magic Behind Managed Application Security Services

Kimberlee Bachman's avatar

Kimberlee Bachman

Metasploit Wrapup: Dec. 8, 2017

Products and Tools

Metasploit Wrapup: Dec. 8, 2017

Brendan Watters's avatar

Brendan Watters

Prepare for Battle: Let’s Build an Incident Response Plan (Part 2)

Detection and Response

Prepare for Battle: Let’s Build an Incident Response Plan (Part 2)

Eric Sun's avatar

Eric Sun

Standing with Massachusetts technology leaders in support of net neutrality

Industry Trends

Standing with Massachusetts technology leaders in support of net neutrality

Corey Thomas's avatar

Corey Thomas