The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

What is Security Automation?

Security Operations

What is Security Automation?

Rapid7's avatar

Rapid7

The CIS Critical Controls Explained - Control 7: Email and Web browser protection

Exposure Management

The CIS Critical Controls Explained - Control 7: Email and Web browser protection

Caspian Kilkelly's avatar

Caspian Kilkelly

CVE-2017-5242: Nexpose/InsightVM Virtual Appliance Duplicate SSH Host Key

Products and Tools

CVE-2017-5242: Nexpose/InsightVM Virtual Appliance Duplicate SSH Host Key

Ken Mizota's avatar

Ken Mizota

R7-2016-23, R7-2016-26, R7-2016-27: Multiple Home Security Vulnerabilities

Vulnerabilities and Exploits

R7-2016-23, R7-2016-26, R7-2016-27: Multiple Home Security Vulnerabilities

Tod Beardsley's avatar

Tod Beardsley

Scanning and Remediating WannaCry/MS17-010 in InsightVM and Nexpose

Detection and Response

Scanning and Remediating WannaCry/MS17-010 in InsightVM and Nexpose

Nathan Palanov's avatar

Nathan Palanov

WannaCry Update: Vulnerable SMB Shares Are Widely Deployed And People Are Scanning For Them (Port 445 Exploit)

Detection and Response

WannaCry Update: Vulnerable SMB Shares Are Widely Deployed And People Are Scanning For Them (Port 445 Exploit)

Roy Hodgman's avatar

Roy Hodgman

Top Threat Actors and Their Tactics, Techniques, Tools, and Targets

Security Operations

Top Threat Actors and Their Tactics, Techniques, Tools, and Targets

Rapid7's avatar

Rapid7

Using Threat Intelligence to Mitigate Wanna Decryptor (WannaCry)

Threat Research

Using Threat Intelligence to Mitigate Wanna Decryptor (WannaCry)

Rebekah Brown's avatar

Rebekah Brown

Exploitable Vulnerabilities: A Metasploit-Vulnerability Management Love Story

Products and Tools

Exploitable Vulnerabilities: A Metasploit-Vulnerability Management Love Story

Dev Mohanty's avatar

Dev Mohanty

Wanna Decryptor (WNCRY) Ransomware Explained

Detection and Response

Wanna Decryptor (WNCRY) Ransomware Explained

boB Rudis's avatar

boB Rudis

White House Cybersecurity Executive Order Summary

Industry Trends

White House Cybersecurity Executive Order Summary

Harley Geiger's avatar

Harley Geiger

On the lookout for Intel AMT CVE-2017-5689

Vulnerabilities and Exploits

On the lookout for Intel AMT CVE-2017-5689

Alex Hin's avatar

Alex Hin

Discovery of assets in Active Directory

Products and Tools

Discovery of assets in Active Directory

Ken Mizota's avatar

Ken Mizota

Simplifying Account Takeover Protection

Rapid7 Blog

Simplifying Account Takeover Protection

Rapid7's avatar

Rapid7

The Real Cost of Manual Security Operations

Security Operations

The Real Cost of Manual Security Operations

Rapid7's avatar

Rapid7

IoT Security Testing Methodology

Detection and Response

IoT Security Testing Methodology

Deral Heiland's avatar

Deral Heiland

Patch Tuesday - May 2017

Detection and Response

Patch Tuesday - May 2017

Greg Wiseman's avatar

Greg Wiseman

ChatOps for Security Operations

Products and Tools

ChatOps for Security Operations

Rapid7's avatar

Rapid7

Metasploit Weekly Wrapup

Exposure Management

Metasploit Weekly Wrapup

Rapid7's avatar

Rapid7

2017 Verizon Data Breach Report (DBIR): Key Takeaways

Threat Research

2017 Verizon Data Breach Report (DBIR): Key Takeaways

boB Rudis's avatar

boB Rudis

3 Simple Ways to Approach Content Security Policy

Rapid7 Blog

3 Simple Ways to Approach Content Security Policy

Rapid7's avatar

Rapid7