The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Digital Footprints, Breadcrumbs, and How Hackers Exploit Them

Threat Research

Digital Footprints, Breadcrumbs, and How Hackers Exploit Them

Ariel Ainhoren's avatar

Ariel Ainhoren

Security Impact of Easily Accessible 
UART on IoT Technology

Threat Research

Security Impact of Easily Accessible UART on IoT Technology

Deral Heiland's avatar

Deral Heiland

Password Tips From a Pen Tester: Common Patterns Exposed

Threat Research

Password Tips From a Pen Tester: Common Patterns Exposed

Patrick Laverty's avatar

Patrick Laverty

Drupalgeddon Vulnerability: What is it? Are You Impacted?

Threat Research

Drupalgeddon Vulnerability: What is it? Are You Impacted?

boB Rudis's avatar

boB Rudis

Threat Intel Book Club: The Cuckoo's Egg wrap-up

Threat Research

Threat Intel Book Club: The Cuckoo's Egg wrap-up

Caitlin Condon's avatar

Caitlin Condon

Simplicity, Harmony, and Opportunity: Rapid7 Threat Report Q3 2017

Threat Research

Simplicity, Harmony, and Opportunity: Rapid7 Threat Report Q3 2017

Rebekah Brown's avatar

Rebekah Brown

Building a Backpack Hypervisor

Threat Research

Building a Backpack Hypervisor

Brendan Watters's avatar

Brendan Watters

Remote Desktop Protocol (RDP) Exposure

Threat Research

Remote Desktop Protocol (RDP) Exposure

Jon Hart's avatar

Jon Hart

Using Threat Intelligence to Mitigate Wanna Decryptor (WannaCry)

Threat Research

Using Threat Intelligence to Mitigate Wanna Decryptor (WannaCry)

Rebekah Brown's avatar

Rebekah Brown

2017 Verizon Data Breach Report (DBIR): Key Takeaways

Threat Research

2017 Verizon Data Breach Report (DBIR): Key Takeaways

boB Rudis's avatar

boB Rudis

Apache Struts Vulnerability (CVE-2017-5638) Exploit Traffic

Threat Research

Apache Struts Vulnerability (CVE-2017-5638) Exploit Traffic

Tom Sellers's avatar

Tom Sellers

12 Days of HaXmas: A HaxMas Carol

Threat Research

12 Days of HaXmas: A HaxMas Carol

boB Rudis's avatar

boB Rudis

Signal to Noise in Internet Scanning Research

Threat Research

Signal to Noise in Internet Scanning Research

Jon Hart's avatar

Jon Hart

The Data Science Process at Rapid7

Threat Research

The Data Science Process at Rapid7

Roy Hodgman's avatar

Roy Hodgman

Project Sonar Study of LDAP on the Internet

Threat Research

Project Sonar Study of LDAP on the Internet

Tom Sellers's avatar

Tom Sellers

Election Day: Tracking the Mirai Botnet

Threat Research

Election Day: Tracking the Mirai Botnet

boB Rudis's avatar

boB Rudis

Research Lead (IoT)

Threat Research

Research Lead (IoT)

Deral Heiland's avatar

Deral Heiland

Digging for Clam[AV]s with Project Sonar

Threat Research

Digging for Clam[AV]s with Project Sonar

boB Rudis's avatar

boB Rudis

The 2016 Verizon Data Breach Investigations Report (DBIR) Summary - The Defender's Perspective

Threat Research

The 2016 Verizon Data Breach Investigations Report (DBIR) Summary - The Defender's Perspective

boB Rudis's avatar

boB Rudis

Threat Intelligence Foundations: Crawl, Walk, Analyze - Part 3

Threat Research

Threat Intelligence Foundations: Crawl, Walk, Analyze - Part 3

Rebekah Brown's avatar

Rebekah Brown

Threat Intelligence Foundations: Crawl, Walk, Analyze - Part 2

Threat Research

Threat Intelligence Foundations: Crawl, Walk, Analyze - Part 2

Rebekah Brown's avatar

Rebekah Brown