The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
245 Results

Threat Research
Digital Footprints, Breadcrumbs, and How Hackers Exploit Them
Ariel Ainhoren

Threat Research
Security Impact of Easily Accessible UART on IoT Technology
Deral Heiland

Threat Research
Password Tips From a Pen Tester: Common Patterns Exposed
Patrick Laverty

Threat Research
Drupalgeddon Vulnerability: What is it? Are You Impacted?
boB Rudis

Threat Research
Threat Intel Book Club: The Cuckoo's Egg wrap-up
Caitlin Condon

Threat Research
Simplicity, Harmony, and Opportunity: Rapid7 Threat Report Q3 2017
Rebekah Brown

Threat Research
Building a Backpack Hypervisor
Brendan Watters

Threat Research
Remote Desktop Protocol (RDP) Exposure
Jon Hart

Threat Research
Using Threat Intelligence to Mitigate Wanna Decryptor (WannaCry)
Rebekah Brown

Threat Research
2017 Verizon Data Breach Report (DBIR): Key Takeaways
boB Rudis

Threat Research
Apache Struts Vulnerability (CVE-2017-5638) Exploit Traffic
Tom Sellers

Threat Research
12 Days of HaXmas: A HaxMas Carol
boB Rudis

Threat Research
Signal to Noise in Internet Scanning Research
Jon Hart

Threat Research
The Data Science Process at Rapid7
Roy Hodgman

Threat Research
Project Sonar Study of LDAP on the Internet
Tom Sellers

Threat Research
Election Day: Tracking the Mirai Botnet
boB Rudis

Threat Research
Research Lead (IoT)
Deral Heiland
![Digging for Clam[AV]s with Project Sonar](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Threat Research
Digging for Clam[AV]s with Project Sonar
boB Rudis

Threat Research
The 2016 Verizon Data Breach Investigations Report (DBIR) Summary - The Defender's Perspective
boB Rudis

Threat Research
Threat Intelligence Foundations: Crawl, Walk, Analyze - Part 3
Rebekah Brown

Threat Research
Threat Intelligence Foundations: Crawl, Walk, Analyze - Part 2
Rebekah Brown