The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrapup: Nov. 11, 2017

Products and Tools

Metasploit Wrapup: Nov. 11, 2017

Dev Mohanty's avatar

Dev Mohanty

Stopping Command Injection Attacks by Instrumenting Application Runtimes

Rapid7 Blog

Stopping Command Injection Attacks by Instrumenting Application Runtimes

Paul Callahan's avatar

Paul Callahan

How to Securely Handle a Lost or Stolen Device: A Practical Workflow

Products and Tools

How to Securely Handle a Lost or Stolen Device: A Practical Workflow

Rapid7's avatar

Rapid7

NCSAM Security Crash Diet: Wrap-up

Industry Trends

NCSAM Security Crash Diet: Wrap-up

Tod Beardsley's avatar

Tod Beardsley

Testing Developer Security with Metasploit Pro Task Chains

Security Operations

Testing Developer Security with Metasploit Pro Task Chains

Pearce Barry's avatar

Pearce Barry

Faster Investigations, Closer Teamwork: InsightIDR Enhancements

Detection and Response

Faster Investigations, Closer Teamwork: InsightIDR Enhancements

Eric Sun's avatar

Eric Sun

Metasploit Wrapup: Nov. 3, 2017

Products and Tools

Metasploit Wrapup: Nov. 3, 2017

Brendan Watters's avatar

Brendan Watters

Changing the Corporate Network Attacker’s Risk-Reward Paradigm

Detection and Response

Changing the Corporate Network Attacker’s Risk-Reward Paradigm

Justin Houk's avatar

Justin Houk

Testing SMB Security with Metasploit Pro Task Chains: Part 2

Exposure Management

Testing SMB Security with Metasploit Pro Task Chains: Part 2

Wei Chen's avatar

Wei Chen

Security Career Paths: Common and Unique Roles

Products and Tools

Security Career Paths: Common and Unique Roles

Rapid7's avatar

Rapid7

NCSAM Security Crash Diet, Week 4: IoT

Detection and Response

NCSAM Security Crash Diet, Week 4: IoT

Rapid7's avatar

Rapid7

Testing SMB Server Security with Metasploit Pro Task Chains: Part 1

Security Operations

Testing SMB Server Security with Metasploit Pro Task Chains: Part 1

Wei Chen's avatar

Wei Chen

Metasploit Wrapup: Oct. 27, 2017

Exposure Management

Metasploit Wrapup: Oct. 27, 2017

Sam Huckins's avatar

Sam Huckins

Why Security Teams Should Embrace (Not Fear) Automation

Security Operations

Why Security Teams Should Embrace (Not Fear) Automation

Rapid7's avatar

Rapid7

ROCA: Vulnerable RSA Key Generation

Exposure Management

ROCA: Vulnerable RSA Key Generation

Deral Heiland's avatar

Deral Heiland

The BadRabbit Ransomware Attack: What You Need To Know

Vulnerabilities and Exploits

The BadRabbit Ransomware Attack: What You Need To Know

boB Rudis's avatar

boB Rudis

NCSAM Security Crash Diet, Week 3: Privacy and Backups

Detection and Response

NCSAM Security Crash Diet, Week 3: Privacy and Backups

Rapid7's avatar

Rapid7

Metasploit Wrapup: Oct. 20, 2017

Products and Tools

Metasploit Wrapup: Oct. 20, 2017

Sam Huckins's avatar

Sam Huckins

5 Wrong Lessons From Equifax, and the Missed Opportunity of OWASP

Rapid7 Blog

5 Wrong Lessons From Equifax, and the Missed Opportunity of OWASP

Rapid7's avatar

Rapid7

Everything You Need to Know About Building a Career in Security

Security Operations

Everything You Need to Know About Building a Career in Security

Rapid7's avatar

Rapid7

NCSAM Security Crash Diet, Week 2: Social and Travel

Industry Trends

NCSAM Security Crash Diet, Week 2: Social and Travel

Rapid7's avatar

Rapid7