The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

The Internet of Gas Station Tank Gauges -- Final Take?

Detection and Response

The Internet of Gas Station Tank Gauges -- Final Take?

Jon Hart's avatar

Jon Hart

Introspective Intelligence: Understanding Detection Techniques

Detection and Response

Introspective Intelligence: Understanding Detection Techniques

Mike Scutt's avatar

Mike Scutt

A Guide on Security Automation Best Practices

Products and Tools

A Guide on Security Automation Best Practices

Rapid7's avatar

Rapid7

The Data Science Process at Rapid7

Threat Research

The Data Science Process at Rapid7

Roy Hodgman's avatar

Roy Hodgman

Metasploitable3: An Intentionally Vulnerable Machine for Exploit Testing

Products and Tools

Metasploitable3: An Intentionally Vulnerable Machine for Exploit Testing

Wei Chen's avatar

Wei Chen

R7-2016-24, OpenNMS Stored XSS via SNMP (CVE-2016-6555, CVE-2016-6556)

Vulnerabilities and Exploits

R7-2016-24, OpenNMS Stored XSS via SNMP (CVE-2016-6555, CVE-2016-6556)

Tod Beardsley's avatar

Tod Beardsley

Goodbye to the VCR: Rewinding Down Memory Lane

Products and Tools

Goodbye to the VCR: Rewinding Down Memory Lane

Rapid7's avatar

Rapid7

Conflicting perspectives on the TLS 1.3 Draft

Industry Trends

Conflicting perspectives on the TLS 1.3 Draft

Tom Sellers's avatar

Tom Sellers

Using CIS Controls To Stop Your Network From Falling in With the Wrong Crowd

Exposure Management

Using CIS Controls To Stop Your Network From Falling in With the Wrong Crowd

Tom Sellers's avatar

Tom Sellers

Project Sonar Study of LDAP on the Internet

Threat Research

Project Sonar Study of LDAP on the Internet

Tom Sellers's avatar

Tom Sellers

Patch Tuesday, November 2016

Detection and Response

Patch Tuesday, November 2016

Adam Nowak's avatar

Adam Nowak

Election Day: Tracking the Mirai Botnet

Threat Research

Election Day: Tracking the Mirai Botnet

boB Rudis's avatar

boB Rudis

The 5 Security Processes That Should Be Automated

Security Operations

The 5 Security Processes That Should Be Automated

Rapid7's avatar

Rapid7

How to Use OpenVAS to Audit the Security of Your Network (1/2)

Products and Tools

How to Use OpenVAS to Audit the Security of Your Network (1/2)

Rapid7's avatar

Rapid7

Widely-used Android App Leaks MS Exchange Credentials

Products and Tools

Widely-used Android App Leaks MS Exchange Credentials

Rapid7's avatar

Rapid7

Rapid7 Rapid Fire at UNITED Summit: A Spirited Debate

Rapid7 Blog

Rapid7 Rapid Fire at UNITED Summit: A Spirited Debate

Amanda Fountain's avatar

Amanda Fountain

Research Lead (IoT)

Threat Research

Research Lead (IoT)

Deral Heiland's avatar

Deral Heiland

[Free Tool] IoTSeeker: Find IoT Devices, Check for Default Passwords

Detection and Response

[Free Tool] IoTSeeker: Find IoT Devices, Check for Default Passwords

Sam Humphries's avatar

Sam Humphries

Nexpose and DXL Integration: Now We're Talking

Products and Tools

Nexpose and DXL Integration: Now We're Talking

Sam Morris's avatar

Sam Morris

Publishing Nexpose Asset Risk Scores to ePO

Industry Trends

Publishing Nexpose Asset Risk Scores to ePO

Divakar Kumar's avatar

Divakar Kumar

NCSAM: The Danger of Criminalizing Curiosity

Industry Trends

NCSAM: The Danger of Criminalizing Curiosity

Amanda Fountain's avatar

Amanda Fountain