The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Malware and Advanced Threat Protection: A User-Host-Process Model

Vulnerabilities and Exploits

Malware and Advanced Threat Protection: A User-Host-Process Model

Tim Stiller's avatar

Tim Stiller

SQL Injection Attacks

Products and Tools

SQL Injection Attacks

Rapid7's avatar

Rapid7

Rapid7 Supports Researcher Protections in Michigan Vehicle Hacking Law

Exposure Management

Rapid7 Supports Researcher Protections in Michigan Vehicle Hacking Law

Harley Geiger's avatar

Harley Geiger

The Komand Tech Stack: Why We Chose Our Technology

Security Operations

The Komand Tech Stack: Why We Chose Our Technology

Rapid7's avatar

Rapid7

Important Security Fixes in Metasploit 4.12.0-2016091401

Products and Tools

Important Security Fixes in Metasploit 4.12.0-2016091401

Brent Cook's avatar

Brent Cook

Moving away from MVC

Products and Tools

Moving away from MVC

Rapid7's avatar

Rapid7

Microservices – Please, don’t

Security Operations

Microservices – Please, don’t

Rapid7's avatar

Rapid7

Malware Attack Vectors

Products and Tools

Malware Attack Vectors

Rapid7's avatar

Rapid7

3 Ways for Generating Reports on WAN Bandwidth Utilization

Detection and Response

3 Ways for Generating Reports on WAN Bandwidth Utilization

Rapid7's avatar

Rapid7

Managing Asset Exclusion to Avoid Blind Spots

Exposure Management

Managing Asset Exclusion to Avoid Blind Spots

Joe Tegg's avatar

Joe Tegg

Multiple Disclosures for Multiple Network Management Systems, Part 2

Vulnerabilities and Exploits

Multiple Disclosures for Multiple Network Management Systems, Part 2

Tod Beardsley's avatar

Tod Beardsley

OSSEC Series: Configuration Pitfalls

Products and Tools

OSSEC Series: Configuration Pitfalls

Rapid7's avatar

Rapid7

The One Aspect of Selling Security That You Don't Want to Miss

Security Operations

The One Aspect of Selling Security That You Don't Want to Miss

kevinbeaver's avatar

kevinbeaver

Credential Status in Reporting Data Model

Products and Tools

Credential Status in Reporting Data Model

maria_d's avatar

maria_d

Log Search Simplified

Detection and Response

Log Search Simplified

Laura Ellis's avatar

Laura Ellis

UX Research: Steps & Methodologies to Inform Product Redesign

Security Operations

UX Research: Steps & Methodologies to Inform Product Redesign

Mindy Maxwell's avatar

Mindy Maxwell

Get your work done even faster with the Logentries REST API

Products and Tools

Get your work done even faster with the Logentries REST API

Rapid7's avatar

Rapid7

Secure Password Storage in Web Apps

Products and Tools

Secure Password Storage in Web Apps

Rapid7's avatar

Rapid7

5 Reasons Companies Are Losing Security Talent (And What to Do)

Security Operations

5 Reasons Companies Are Losing Security Talent (And What to Do)

Rapid7's avatar

Rapid7

Filtering and Automated Decisions with PEG.js and React-Mentions

Security Operations

Filtering and Automated Decisions with PEG.js and React-Mentions

Rapid7's avatar

Rapid7

Hashing Infrastructures

Products and Tools

Hashing Infrastructures

Rapid7's avatar

Rapid7