The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Introduction to Honeypots

Detection and Response

Introduction to Honeypots

Rapid7's avatar

Rapid7

SOC Series: How to Make a Security Operations Center More Efficient

Security Operations

SOC Series: How to Make a Security Operations Center More Efficient

Rapid7's avatar

Rapid7

Early Warning Detectors Using AWS Access Keys as Honeytokens

Security Operations

Early Warning Detectors Using AWS Access Keys as Honeytokens

Rapid7's avatar

Rapid7

Announcing InsightOps - Pioneering Endpoint Visibility and Log Analytics

Detection and Response

Announcing InsightOps - Pioneering Endpoint Visibility and Log Analytics

Trevor Parsons's avatar

Trevor Parsons

On the Recent DSL Modem Vulnerabilities

Industry Trends

On the Recent DSL Modem Vulnerabilities

Tod Beardsley's avatar

Tod Beardsley

Adding Proactive Components to Your Incident Response Process

Security Operations

Adding Proactive Components to Your Incident Response Process

Rapid7's avatar

Rapid7

Deception Technology: Can It Detect Intruders Earlier in their Attack Chain?

Detection and Response

Deception Technology: Can It Detect Intruders Earlier in their Attack Chain?

Eric Sun's avatar

Eric Sun

Dimensional Data Warehouse Export, Part of Nexpose 6.4.6

Products and Tools

Dimensional Data Warehouse Export, Part of Nexpose 6.4.6

Jennifer Liou's avatar

Jennifer Liou

3 Signals Your Security Workflows Are Inefficient

Security Operations

3 Signals Your Security Workflows Are Inefficient

Rapid7's avatar

Rapid7

How to Use OpenVAS to Audit the Security of Your Network (2/2)

Products and Tools

How to Use OpenVAS to Audit the Security of Your Network (2/2)

Rapid7's avatar

Rapid7

Node.js as a Proxy to Logentries.com

Products and Tools

Node.js as a Proxy to Logentries.com

Rapid7's avatar

Rapid7

Building Personalized and Exceptional Customer Experiences

Products and Tools

Building Personalized and Exceptional Customer Experiences

Ger Joyce's avatar

Ger Joyce

Metasploit Wrapup 11/18/16

Rapid7 Blog

Metasploit Wrapup 11/18/16

Egypt's avatar

Egypt

Signal to Noise in Internet Scanning Research

Threat Research

Signal to Noise in Internet Scanning Research

Jon Hart's avatar

Jon Hart

How to Troubleshoot Slow Network Issues With Network Traffic Analysis

Detection and Response

How to Troubleshoot Slow Network Issues With Network Traffic Analysis

Rapid7's avatar

Rapid7

The Internet of Gas Station Tank Gauges -- Final Take?

Detection and Response

The Internet of Gas Station Tank Gauges -- Final Take?

Jon Hart's avatar

Jon Hart

Introspective Intelligence: Understanding Detection Techniques

Detection and Response

Introspective Intelligence: Understanding Detection Techniques

Mike Scutt's avatar

Mike Scutt

A Guide on Security Automation Best Practices

Products and Tools

A Guide on Security Automation Best Practices

Rapid7's avatar

Rapid7

The Data Science Process at Rapid7

Threat Research

The Data Science Process at Rapid7

Roy Hodgman's avatar

Roy Hodgman

Metasploitable3: An Intentionally Vulnerable Machine for Exploit Testing

Products and Tools

Metasploitable3: An Intentionally Vulnerable Machine for Exploit Testing

Wei Chen's avatar

Wei Chen

R7-2016-24, OpenNMS Stored XSS via SNMP (CVE-2016-6555, CVE-2016-6556)

Vulnerabilities and Exploits

R7-2016-24, OpenNMS Stored XSS via SNMP (CVE-2016-6555, CVE-2016-6556)

Tod Beardsley's avatar

Tod Beardsley