The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Attacking Microsoft Office - OpenOffice with Metasploit Macro Exploits

Detection and Response

Attacking Microsoft Office - OpenOffice with Metasploit Macro Exploits

Wei Chen's avatar

Wei Chen

Security Orchestration and Security Automation: What is the Difference?

Security Operations

Security Orchestration and Security Automation: What is the Difference?

Rapid7's avatar

Rapid7

The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets

Exposure Management

The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets

Caspian Kilkelly's avatar

Caspian Kilkelly

The Cloudflare (Cloudbleed) Proxy Service Vulnerability Explained

Vulnerabilities and Exploits

The Cloudflare (Cloudbleed) Proxy Service Vulnerability Explained

Justin Pagano's avatar

Justin Pagano

Roots and Culture: Logging and the Telephone Bill

Products and Tools

Roots and Culture: Logging and the Telephone Bill

Rapid7's avatar

Rapid7

Weekly Metasploit Wrapup: 2/23/17

Products and Tools

Weekly Metasploit Wrapup: 2/23/17

Pearce Barry's avatar

Pearce Barry

Comparing and Modifying Objects in React

Security Operations

Comparing and Modifying Objects in React

Rapid7's avatar

Rapid7

The CIS Critical Security Controls Explained - Control 2: Inventory and Control of Software Assets

Exposure Management

The CIS Critical Security Controls Explained - Control 2: Inventory and Control of Software Assets

Caspian Kilkelly's avatar

Caspian Kilkelly

Incident Investigation: It's All About Context

Security Operations

Incident Investigation: It's All About Context

Rapid7's avatar

Rapid7

Automated Cybersecurity Information Sharing with DHS AIS system

Products and Tools

Automated Cybersecurity Information Sharing with DHS AIS system

Rapid7's avatar

Rapid7

Information sharing recommendations of NIST SP 800-61

Products and Tools

Information sharing recommendations of NIST SP 800-61

Rapid7's avatar

Rapid7

Suricata Overview

Products and Tools

Suricata Overview

Rapid7's avatar

Rapid7

Preparation Phase of Incident Response Life Cycle of NIST SP 800-61

Products and Tools

Preparation Phase of Incident Response Life Cycle of NIST SP 800-61

Rapid7's avatar

Rapid7

The Team Cymru Malware Hash Registry

Products and Tools

The Team Cymru Malware Hash Registry

Rapid7's avatar

Rapid7

February 2017 Patch Tuesday: Delayed

Detection and Response

February 2017 Patch Tuesday: Delayed

Greg Wiseman's avatar

Greg Wiseman

How to Configure a Basic IPsec Tunnel

Products and Tools

How to Configure a Basic IPsec Tunnel

Rapid7's avatar

Rapid7

How to Install Suricata NIDS on Ubuntu Linux

Products and Tools

How to Install Suricata NIDS on Ubuntu Linux

Rapid7's avatar

Rapid7

How To Protect SSH and Apache Using Fail2Ban on Ubuntu Linux

Products and Tools

How To Protect SSH and Apache Using Fail2Ban on Ubuntu Linux

Rapid7's avatar

Rapid7

Detection and Analysis Phase of Incident Response Life Cycle of NIST SP 800-61

Products and Tools

Detection and Analysis Phase of Incident Response Life Cycle of NIST SP 800-61

Rapid7's avatar

Rapid7

Understanding GRE (2/2)

Products and Tools

Understanding GRE (2/2)

Rapid7's avatar

Rapid7

Basics of IPsec

Products and Tools

Basics of IPsec

Rapid7's avatar

Rapid7