The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploitable3 CTF Results and Wrap-Up

Products and Tools

Metasploitable3 CTF Results and Wrap-Up

Brian O'Neill's avatar

Brian O'Neill

12 Days of HaXmas: Year-End Policy Comment Roundup

Exposure Management

12 Days of HaXmas: Year-End Policy Comment Roundup

Harley Geiger's avatar

Harley Geiger

12 Days of HaXmas: A HaxMas Carol

Threat Research

12 Days of HaXmas: A HaxMas Carol

boB Rudis's avatar

boB Rudis

macOS Agent in Nexpose Now

Detection and Response

macOS Agent in Nexpose Now

Ken Mizota's avatar

Ken Mizota

Logs To Understand User Activity and Behavior

Products and Tools

Logs To Understand User Activity and Behavior

Rapid7's avatar

Rapid7

12 Days of HaXmas: Designing Information Security Applications Your Way

Exposure Management

12 Days of HaXmas: Designing Information Security Applications Your Way

Kevin Lin's avatar

Kevin Lin

12 Days of HaXmas: 2016 IoT Research Recap

Exposure Management

12 Days of HaXmas: 2016 IoT Research Recap

Deral Heiland's avatar

Deral Heiland

12 Days of HaXmas: The One Present This Data Scientist Wants This Holiday Season

Exposure Management

12 Days of HaXmas: The One Present This Data Scientist Wants This Holiday Season

Oliver Keyes's avatar

Oliver Keyes

The Twelve Pains of Infosec

Detection and Response

The Twelve Pains of Infosec

Kirk Hayes's avatar

Kirk Hayes

The Value of Correlation IDs

Products and Tools

The Value of Correlation IDs

Rapid7's avatar

Rapid7

SIEM Tools Aren't Dead, They're Just Shedding Some Extra Pounds

Detection and Response

SIEM Tools Aren't Dead, They're Just Shedding Some Extra Pounds

Eric Sun's avatar

Eric Sun

Cybersecurity careers and the certifications needed

Products and Tools

Cybersecurity careers and the certifications needed

Rapid7's avatar

Rapid7

2017 Cybersecurity Horoscopes

Industry Trends

2017 Cybersecurity Horoscopes

Amanda Fountain's avatar

Amanda Fountain

"Informational" Vulnerabilities vs. True Vulnerabilities

Exposure Management

"Informational" Vulnerabilities vs. True Vulnerabilities

Nathan Palanov's avatar

Nathan Palanov

Inspecting Network Traffic with tcpdump

Products and Tools

Inspecting Network Traffic with tcpdump

Rapid7's avatar

Rapid7

How to Install OpenVPN on Windows

Products and Tools

How to Install OpenVPN on Windows

Rapid7's avatar

Rapid7

Web Shells 101: Detection and Prevention

Detection and Response

Web Shells 101: Detection and Prevention

Oliver Keyes's avatar

Oliver Keyes

Metasploitable3 CTF Competition: Update and Leaderboard!

Products and Tools

Metasploitable3 CTF Competition: Update and Leaderboard!

Brian O'Neill's avatar

Brian O'Neill

The Generosity of Thought: Caring and Sharing in the Open Source Community

Products and Tools

The Generosity of Thought: Caring and Sharing in the Open Source Community

Rapid7's avatar

Rapid7

3 Steps for Effective Information Security Event Triage [Infographic]

Security Operations

3 Steps for Effective Information Security Event Triage [Infographic]

Rapid7's avatar

Rapid7

Burp Series: Intercepting and modifying made easy

Products and Tools

Burp Series: Intercepting and modifying made easy

Rapid7's avatar

Rapid7