The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Pentesting in the Real World: Gathering the Right Intel

Exposure Management

Pentesting in the Real World: Gathering the Right Intel

Patrick Laverty's avatar

Patrick Laverty

Using Logentries With Angular v1.5

Products and Tools

Using Logentries With Angular v1.5

Rapid7's avatar

Rapid7

How to Build a Powerful Cybersecurity Arsenal with Free & Open Source Tools

Security Operations

How to Build a Powerful Cybersecurity Arsenal with Free & Open Source Tools

Rapid7's avatar

Rapid7

Making Bug Reporting Easier with AWS S3 and AWS Lambda

Security Operations

Making Bug Reporting Easier with AWS S3 and AWS Lambda

Rapid7's avatar

Rapid7

REST API: a little cURL and some Python

Products and Tools

REST API: a little cURL and some Python

Rapid7's avatar

Rapid7

Quick security wins in Golang (Part 1)

Security Operations

Quick security wins in Golang (Part 1)

Rapid7's avatar

Rapid7

Backup Log Checks and What They Can Tell You

Products and Tools

Backup Log Checks and What They Can Tell You

Rapid7's avatar

Rapid7

R7-2016-08: Seeking Alpha Mobile App Unencrypted Sensitive Information Disclosure

Vulnerabilities and Exploits

R7-2016-08: Seeking Alpha Mobile App Unencrypted Sensitive Information Disclosure

Tod Beardsley's avatar

Tod Beardsley

Patch Tuesday, July 2016

Detection and Response

Patch Tuesday, July 2016

Adam Nowak's avatar

Adam Nowak

A Guide to Defending Pokemon Go Gyms: Lessons from Cybersecurity

Security Operations

A Guide to Defending Pokemon Go Gyms: Lessons from Cybersecurity

Rapid7's avatar

Rapid7

Keep Your Code Clean while Logging

Products and Tools

Keep Your Code Clean while Logging

Rapid7's avatar

Rapid7

Local Cybersecurity Meetups Near You

Security Operations

Local Cybersecurity Meetups Near You

Rapid7's avatar

Rapid7

Honing Your Application Security Chops on DevSecOps

Cloud and Devops Security

Honing Your Application Security Chops on DevSecOps

Brian O'Neill's avatar

Brian O'Neill

Announcement: End-of-Life Metasploit 32-Bit Versions

Products and Tools

Announcement: End-of-Life Metasploit 32-Bit Versions

Leo Varela's avatar

Leo Varela

Self-describing Logging Using Log4J

Products and Tools

Self-describing Logging Using Log4J

Rapid7's avatar

Rapid7

The Best Strategies for a Successful Security Operations Center Explained by 4 Security Experts

Security Operations

The Best Strategies for a Successful Security Operations Center Explained by 4 Security Experts

Rapid7's avatar

Rapid7

How Audit Logs Help Confirm and Correct Security Policy

Products and Tools

How Audit Logs Help Confirm and Correct Security Policy

Rapid7's avatar

Rapid7

Signal AND Noise The Best of All Worlds for Logging

Products and Tools

Signal AND Noise The Best of All Worlds for Logging

Rapid7's avatar

Rapid7

Digging for Clam[AV]s with Project Sonar

Threat Research

Digging for Clam[AV]s with Project Sonar

boB Rudis's avatar

boB Rudis

AWS Series: Creating a Privoxy, Tor Instance

Products and Tools

AWS Series: Creating a Privoxy, Tor Instance

Rapid7's avatar

Rapid7

AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration

Products and Tools

AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration

Rapid7's avatar

Rapid7