The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Apache Struts Vulnerability (CVE-2017-5638) Protection: Scanning with Nexpose

Products and Tools

Apache Struts Vulnerability (CVE-2017-5638) Protection: Scanning with Nexpose

Ciaran McCrisken's avatar

Ciaran McCrisken

How to Onboard and Train Your Security Team

Security Operations

How to Onboard and Train Your Security Team

Rapid7's avatar

Rapid7

Pen Testing Cars with Metasploit and Particle.io Photon Boards

Exposure Management

Pen Testing Cars with Metasploit and Particle.io Photon Boards

Craig Smith's avatar

Craig Smith

R7-2017-01: Multiple Vulnerabilities in Double Robotics Telepresence Robot

Vulnerabilities and Exploits

R7-2017-01: Multiple Vulnerabilities in Double Robotics Telepresence Robot

Sam Huckins's avatar

Sam Huckins

Log Analysis for System Troubleshooting

Products and Tools

Log Analysis for System Troubleshooting

Rapid7's avatar

Rapid7

Metasploit Weekly Wrapup: March 10, 2017

Exposure Management

Metasploit Weekly Wrapup: March 10, 2017

William Webb's avatar

William Webb

The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Exposure Management

The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Joel Cardella's avatar

Joel Cardella

Sybil Attacks, Detection and Prevention

Products and Tools

Sybil Attacks, Detection and Prevention

Rapid7's avatar

Rapid7

Apache Struts Vulnerability (CVE-2017-5638) Exploit Traffic

Threat Research

Apache Struts Vulnerability (CVE-2017-5638) Exploit Traffic

Tom Sellers's avatar

Tom Sellers

Attacking Microsoft Office - OpenOffice with Metasploit Macro Exploits

Detection and Response

Attacking Microsoft Office - OpenOffice with Metasploit Macro Exploits

Wei Chen's avatar

Wei Chen

Security Orchestration and Security Automation: What is the Difference?

Security Operations

Security Orchestration and Security Automation: What is the Difference?

Rapid7's avatar

Rapid7

The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets

Exposure Management

The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets

Caspian Kilkelly's avatar

Caspian Kilkelly

The Cloudflare (Cloudbleed) Proxy Service Vulnerability Explained

Vulnerabilities and Exploits

The Cloudflare (Cloudbleed) Proxy Service Vulnerability Explained

Justin Pagano's avatar

Justin Pagano

Roots and Culture: Logging and the Telephone Bill

Products and Tools

Roots and Culture: Logging and the Telephone Bill

Rapid7's avatar

Rapid7

Weekly Metasploit Wrapup: 2/23/17

Products and Tools

Weekly Metasploit Wrapup: 2/23/17

Pearce Barry's avatar

Pearce Barry

Comparing and Modifying Objects in React

Security Operations

Comparing and Modifying Objects in React

Rapid7's avatar

Rapid7

The CIS Critical Security Controls Explained - Control 2: Inventory and Control of Software Assets

Exposure Management

The CIS Critical Security Controls Explained - Control 2: Inventory and Control of Software Assets

Caspian Kilkelly's avatar

Caspian Kilkelly

Incident Investigation: It's All About Context

Security Operations

Incident Investigation: It's All About Context

Rapid7's avatar

Rapid7

Automated Cybersecurity Information Sharing with DHS AIS system

Products and Tools

Automated Cybersecurity Information Sharing with DHS AIS system

Rapid7's avatar

Rapid7

Information sharing recommendations of NIST SP 800-61

Products and Tools

Information sharing recommendations of NIST SP 800-61

Rapid7's avatar

Rapid7

Suricata Overview

Products and Tools

Suricata Overview

Rapid7's avatar

Rapid7