The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
3612 Results

Products and Tools
Announcement: End-of-Life Metasploit 32-Bit Versions
Leo Varela

Products and Tools
Self-describing Logging Using Log4J
Rapid7
Security Operations
The Best Strategies for a Successful Security Operations Center Explained by 4 Security Experts
Rapid7

Products and Tools
How Audit Logs Help Confirm and Correct Security Policy
Rapid7

Products and Tools
Signal AND Noise The Best of All Worlds for Logging
Rapid7
![Digging for Clam[AV]s with Project Sonar](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Threat Research
Digging for Clam[AV]s with Project Sonar
boB Rudis

Products and Tools
AWS Series: Creating a Privoxy, Tor Instance
Rapid7

Products and Tools
AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration
Rapid7

Products and Tools
Bro Series: Creating a Bro Cluster
Rapid7

Exposure Management
Penetration Test vs. Red Team Assessment: The Age Old Debate of Pirates vs. Ninjas Continues
Kirk Hayes

Vulnerabilities and Exploits
R7-2016-06: Remote Code Execution via Swagger Parameter Injection (CVE-2016-5641)
Scott Davis

Products and Tools
Vulnerability Regression Monitoring With Nexpose
Francisco Slavin

Products and Tools
Migrating a web app to Angular
Rapid7

Products and Tools
Seven Ways InsightIDR Helps Maintain PCI Compliance
Eric Sun

Products and Tools
Webinar Recap: Tableau Server Log Analytics
Rapid7
Security Operations
Defender Spotlight: Ryan Huber of Slack
Rapid7

Products and Tools
Monitoring SNS Activity Using a Lambda Function and Logentries
Rapid7

Products and Tools
Checking Active Directory (AD) Security and Integrity via Log Monitoring
Rapid7

Detection and Response
What are Networking Intrusion Prevention/Detection Systems?
Rapid7

Products and Tools
GDB for Fun (and Profit!)
Rapid7

Products and Tools
Exploiting Zookeeper for managing processes in a production environment with Lockex
Rapid7