The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Announcement: End-of-Life Metasploit 32-Bit Versions

Products and Tools

Announcement: End-of-Life Metasploit 32-Bit Versions

Leo Varela's avatar

Leo Varela

Self-describing Logging Using Log4J

Products and Tools

Self-describing Logging Using Log4J

Rapid7's avatar

Rapid7

The Best Strategies for a Successful Security Operations Center Explained by 4 Security Experts

Security Operations

The Best Strategies for a Successful Security Operations Center Explained by 4 Security Experts

Rapid7's avatar

Rapid7

How Audit Logs Help Confirm and Correct Security Policy

Products and Tools

How Audit Logs Help Confirm and Correct Security Policy

Rapid7's avatar

Rapid7

Signal AND Noise The Best of All Worlds for Logging

Products and Tools

Signal AND Noise The Best of All Worlds for Logging

Rapid7's avatar

Rapid7

Digging for Clam[AV]s with Project Sonar

Threat Research

Digging for Clam[AV]s with Project Sonar

boB Rudis's avatar

boB Rudis

AWS Series: Creating a Privoxy, Tor Instance

Products and Tools

AWS Series: Creating a Privoxy, Tor Instance

Rapid7's avatar

Rapid7

AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration

Products and Tools

AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration

Rapid7's avatar

Rapid7

Bro Series: Creating a Bro Cluster

Products and Tools

Bro Series: Creating a Bro Cluster

Rapid7's avatar

Rapid7

Penetration Test vs. Red Team Assessment: The Age Old Debate of Pirates vs. Ninjas Continues

Exposure Management

Penetration Test vs. Red Team Assessment: The Age Old Debate of Pirates vs. Ninjas Continues

Kirk Hayes's avatar

Kirk Hayes

R7-2016-06: Remote Code Execution via Swagger Parameter Injection (CVE-2016-5641)

Vulnerabilities and Exploits

R7-2016-06: Remote Code Execution via Swagger Parameter Injection (CVE-2016-5641)

Scott Davis's avatar

Scott Davis

Vulnerability Regression Monitoring With Nexpose

Products and Tools

Vulnerability Regression Monitoring With Nexpose

Francisco Slavin's avatar

Francisco Slavin

Migrating a web app to Angular

Products and Tools

Migrating a web app to Angular

Rapid7's avatar

Rapid7

Seven Ways InsightIDR Helps Maintain PCI Compliance

Products and Tools

Seven Ways InsightIDR Helps Maintain PCI Compliance

Eric Sun's avatar

Eric Sun

Webinar Recap: Tableau Server Log Analytics

Products and Tools

Webinar Recap: Tableau Server Log Analytics

Rapid7's avatar

Rapid7

Defender Spotlight: Ryan Huber of Slack

Security Operations

Defender Spotlight: Ryan Huber of Slack

Rapid7's avatar

Rapid7

Monitoring SNS Activity Using a Lambda Function and Logentries

Products and Tools

Monitoring SNS Activity Using a Lambda Function and Logentries

Rapid7's avatar

Rapid7

Checking Active Directory (AD) Security and Integrity via Log Monitoring

Products and Tools

Checking Active Directory (AD) Security and Integrity via Log Monitoring

Rapid7's avatar

Rapid7

What are Networking Intrusion Prevention/Detection Systems?

Detection and Response

What are Networking Intrusion Prevention/Detection Systems?

Rapid7's avatar

Rapid7

GDB for Fun (and Profit!)

Products and Tools

GDB for Fun (and Profit!)

Rapid7's avatar

Rapid7

Exploiting Zookeeper for managing processes in a production environment with Lockex

Products and Tools

Exploiting Zookeeper for managing processes in a production environment with Lockex

Rapid7's avatar

Rapid7