The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
3627 Results

Products and Tools
Metasploit's RF Transceiver Capabilities
Craig Smith

Products and Tools
Cybersecurity exercises – benefits and practical aspects (part 2 of 2)
Rapid7

Products and Tools
Cybersecurity exercises – benefits and practical aspects (part 1 of 2)
Rapid7

Products and Tools
Cybersecurity Information Sharing - European Perspective (part 1 of 2)
Rapid7

Exposure Management
The CIS Critical Security Controls Explained - Control 3: Continuous Vulnerability Management
Magen Wu

Products and Tools
Metasploit, Google Summer of Code, and You!
Egypt

Products and Tools
Apache Struts Vulnerability (CVE-2017-5638) Protection: Scanning with Nexpose
Ciaran McCrisken
Security Operations
How to Onboard and Train Your Security Team
Rapid7

Exposure Management
Pen Testing Cars with Metasploit and Particle.io Photon Boards
Craig Smith

Vulnerabilities and Exploits
R7-2017-01: Multiple Vulnerabilities in Double Robotics Telepresence Robot
Sam Huckins

Products and Tools
Log Analysis for System Troubleshooting
Rapid7

Exposure Management
Metasploit Weekly Wrapup: March 10, 2017
William Webb

Exposure Management
The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Joel Cardella

Products and Tools
Sybil Attacks, Detection and Prevention
Rapid7

Threat Research
Apache Struts Vulnerability (CVE-2017-5638) Exploit Traffic
Tom Sellers

Detection and Response
Attacking Microsoft Office - OpenOffice with Metasploit Macro Exploits
Wei Chen
Security Operations
Security Orchestration and Security Automation: What is the Difference?
Rapid7

Exposure Management
The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets
Caspian Kilkelly

Vulnerabilities and Exploits
The Cloudflare (Cloudbleed) Proxy Service Vulnerability Explained
Justin Pagano

Products and Tools
Roots and Culture: Logging and the Telephone Bill
Rapid7

Products and Tools
Weekly Metasploit Wrapup: 2/23/17
Pearce Barry