The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Wanna Decryptor (WNCRY) Ransomware Explained

Detection and Response

Wanna Decryptor (WNCRY) Ransomware Explained

boB Rudis's avatar

boB Rudis

White House Cybersecurity Executive Order Summary

Industry Trends

White House Cybersecurity Executive Order Summary

Harley Geiger's avatar

Harley Geiger

On the lookout for Intel AMT CVE-2017-5689

Vulnerabilities and Exploits

On the lookout for Intel AMT CVE-2017-5689

Alex Hin's avatar

Alex Hin

Discovery of assets in Active Directory

Products and Tools

Discovery of assets in Active Directory

Ken Mizota's avatar

Ken Mizota

Simplifying Account Takeover Protection

Rapid7 Blog

Simplifying Account Takeover Protection

Rapid7's avatar

Rapid7

The Real Cost of Manual Security Operations

Security Operations

The Real Cost of Manual Security Operations

Rapid7's avatar

Rapid7

IoT Security Testing Methodology

Detection and Response

IoT Security Testing Methodology

Deral Heiland's avatar

Deral Heiland

Patch Tuesday - May 2017

Detection and Response

Patch Tuesday - May 2017

Greg Wiseman's avatar

Greg Wiseman

ChatOps for Security Operations

Products and Tools

ChatOps for Security Operations

Rapid7's avatar

Rapid7

Metasploit Weekly Wrapup

Exposure Management

Metasploit Weekly Wrapup

Rapid7's avatar

Rapid7

2017 Verizon Data Breach Report (DBIR): Key Takeaways

Threat Research

2017 Verizon Data Breach Report (DBIR): Key Takeaways

boB Rudis's avatar

boB Rudis

3 Simple Ways to Approach Content Security Policy

Rapid7 Blog

3 Simple Ways to Approach Content Security Policy

Rapid7's avatar

Rapid7

Translating and Detecting Unicode Phishing Domains with Komand's Security Orchestration Platform

Security Operations

Translating and Detecting Unicode Phishing Domains with Komand's Security Orchestration Platform

Rapid7's avatar

Rapid7

Asia Cybersecurity Event Calendar [Free Shared Google Calendar]

Security Operations

Asia Cybersecurity Event Calendar [Free Shared Google Calendar]

Rapid7's avatar

Rapid7

A Privacy Stack for Protecting Your Data

Security Operations

A Privacy Stack for Protecting Your Data

Rapid7's avatar

Rapid7

R7-2017-02: Hyundai Blue Link Potential Info Disclosure (FIXED)

Vulnerabilities and Exploits

R7-2017-02: Hyundai Blue Link Potential Info Disclosure (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Actionable Vulnerability Remediation Projects in InsightVM

Products and Tools

Actionable Vulnerability Remediation Projects in InsightVM

Jennifer Liou's avatar

Jennifer Liou

The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs

Exposure Management

The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs

Cindy Jones's avatar

Cindy Jones

Introduction to ISO/IEC 27035 - the ISO Standard on Incident Handling

Products and Tools

Introduction to ISO/IEC 27035 - the ISO Standard on Incident Handling

Rapid7's avatar

Rapid7

Introduction to ISO/IEC 27035 - Planning for and Detection of Incidents

Products and Tools

Introduction to ISO/IEC 27035 - Planning for and Detection of Incidents

Rapid7's avatar

Rapid7

Introduction to ISO/IEC 27035 - Assessment and Responding to Incidents

Products and Tools

Introduction to ISO/IEC 27035 - Assessment and Responding to Incidents

Rapid7's avatar

Rapid7