The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Investigating Our Technology —  Internet of Things or Internet of Threats?

Security Operations

Investigating Our Technology — Internet of Things or Internet of Threats?

Rapid7's avatar

Rapid7

R7-2016-28: Multiple Eview EV-07S GPS Tracker Vulnerabilities

Vulnerabilities and Exploits

R7-2016-28: Multiple Eview EV-07S GPS Tracker Vulnerabilities

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrapup 3/24/17

Exposure Management

Metasploit Wrapup 3/24/17

Egypt's avatar

Egypt

The CIS Critical Security Controls Explained - Control 4: Controlled Use of Administrative Privilege

Exposure Management

The CIS Critical Security Controls Explained - Control 4: Controlled Use of Administrative Privilege

Joel Cardella's avatar

Joel Cardella

Exploiting Macros via Email with Metasploit Pro Social Engineering

Exposure Management

Exploiting Macros via Email with Metasploit Pro Social Engineering

Kyle Gray's avatar

Kyle Gray

Malware Incident Response Steps on Windows, and Determining If the Threat Is Truly Gone

Security Operations

Malware Incident Response Steps on Windows, and Determining If the Threat Is Truly Gone

Rapid7's avatar

Rapid7

Metasploit's RF Transceiver Capabilities

Products and Tools

Metasploit's RF Transceiver Capabilities

Craig Smith's avatar

Craig Smith

Cybersecurity exercises – benefits and practical aspects (part 2 of 2)

Products and Tools

Cybersecurity exercises – benefits and practical aspects (part 2 of 2)

Rapid7's avatar

Rapid7

Cybersecurity exercises – benefits and practical aspects (part 1 of 2)

Products and Tools

Cybersecurity exercises – benefits and practical aspects (part 1 of 2)

Rapid7's avatar

Rapid7

Cybersecurity Information Sharing - European Perspective (part 1 of 2)

Products and Tools

Cybersecurity Information Sharing - European Perspective (part 1 of 2)

Rapid7's avatar

Rapid7

The CIS Critical Security Controls Explained - Control 3: Continuous Vulnerability Management

Exposure Management

The CIS Critical Security Controls Explained - Control 3: Continuous Vulnerability Management

Magen Wu's avatar

Magen Wu

Metasploit, Google Summer of Code, and You!

Products and Tools

Metasploit, Google Summer of Code, and You!

Egypt's avatar

Egypt

Apache Struts Vulnerability (CVE-2017-5638) Protection: Scanning with Nexpose

Products and Tools

Apache Struts Vulnerability (CVE-2017-5638) Protection: Scanning with Nexpose

Ciaran McCrisken's avatar

Ciaran McCrisken

How to Onboard and Train Your Security Team

Security Operations

How to Onboard and Train Your Security Team

Rapid7's avatar

Rapid7

Pen Testing Cars with Metasploit and Particle.io Photon Boards

Exposure Management

Pen Testing Cars with Metasploit and Particle.io Photon Boards

Craig Smith's avatar

Craig Smith

R7-2017-01: Multiple Vulnerabilities in Double Robotics Telepresence Robot

Vulnerabilities and Exploits

R7-2017-01: Multiple Vulnerabilities in Double Robotics Telepresence Robot

Sam Huckins's avatar

Sam Huckins

Log Analysis for System Troubleshooting

Products and Tools

Log Analysis for System Troubleshooting

Rapid7's avatar

Rapid7

Metasploit Weekly Wrapup: March 10, 2017

Exposure Management

Metasploit Weekly Wrapup: March 10, 2017

William Webb's avatar

William Webb

The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Exposure Management

The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Joel Cardella's avatar

Joel Cardella

Sybil Attacks, Detection and Prevention

Products and Tools

Sybil Attacks, Detection and Prevention

Rapid7's avatar

Rapid7

Apache Struts Vulnerability (CVE-2017-5638) Exploit Traffic

Threat Research

Apache Struts Vulnerability (CVE-2017-5638) Exploit Traffic

Tom Sellers's avatar

Tom Sellers