The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Weekly Wrapup: Aug. 12, 2016

Exposure Management

Metasploit Weekly Wrapup: Aug. 12, 2016

William Webb's avatar

William Webb

Using Log Data as Forensic Evidence

Products and Tools

Using Log Data as Forensic Evidence

Annie Hathaway's avatar

Annie Hathaway

4 Potential Security Issues Raised By Pokémon Go

Products and Tools

4 Potential Security Issues Raised By Pokémon Go

Rapid7's avatar

Rapid7

NIST 800-53 Control Mappings in SQL Query Export

Vulnerabilities and Exploits

NIST 800-53 Control Mappings in SQL Query Export

Jake Korona's avatar

Jake Korona

A Framework for Selecting and Implementing Security Tools Today

Security Operations

A Framework for Selecting and Implementing Security Tools Today

Rapid7's avatar

Rapid7

Building a Simple CLI Tool with Golang

Security Operations

Building a Simple CLI Tool with Golang

Rapid7's avatar

Rapid7

Bro Series: The Programming Language

Products and Tools

Bro Series: The Programming Language

Rapid7's avatar

Rapid7

Integrating Logentries with OpsGenie: 3 Easy Steps

Products and Tools

Integrating Logentries with OpsGenie: 3 Easy Steps

Rapid7's avatar

Rapid7

Defender Spotlight: April C. Wright of Verizon Enterprise Services

Security Operations

Defender Spotlight: April C. Wright of Verizon Enterprise Services

Rapid7's avatar

Rapid7

Pentesting in the Real World: Going Bananas with MongoDB

Exposure Management

Pentesting in the Real World: Going Bananas with MongoDB

Leon Johnson's avatar

Leon Johnson

Exporting Logentries data with Leexportpy

Products and Tools

Exporting Logentries data with Leexportpy

Rapid7's avatar

Rapid7

AppSpider application security scanning solution deepens support for Single Page Applications - ReactJS

Products and Tools

AppSpider application security scanning solution deepens support for Single Page Applications - ReactJS

David Howe's avatar

David Howe

What exactly is an Event-loop?

Products and Tools

What exactly is an Event-loop?

Rapid7's avatar

Rapid7

How Security Orchestration Can Stop Insider and Outsider Attacks

Security Operations

How Security Orchestration Can Stop Insider and Outsider Attacks

Rapid7's avatar

Rapid7

Pentesting in the Real World: Capturing Credentials on an Internal Network

Exposure Management

Pentesting in the Real World: Capturing Credentials on an Internal Network

Robert Stewart's avatar

Robert Stewart

Introduction to the Logentries Command Line Interface

Products and Tools

Introduction to the Logentries Command Line Interface

Rapid7's avatar

Rapid7

R7-2016-10: Multiple OSRAM SYLVANIA Osram Lightify Vulnerabilities (CVE-2016-5051 through 5059)

Detection and Response

R7-2016-10: Multiple OSRAM SYLVANIA Osram Lightify Vulnerabilities (CVE-2016-5051 through 5059)

Tod Beardsley's avatar

Tod Beardsley

Pentesting in the Real World: Gathering the Right Intel

Exposure Management

Pentesting in the Real World: Gathering the Right Intel

Patrick Laverty's avatar

Patrick Laverty

Using Logentries With Angular v1.5

Products and Tools

Using Logentries With Angular v1.5

Rapid7's avatar

Rapid7

How to Build a Powerful Cybersecurity Arsenal with Free & Open Source Tools

Security Operations

How to Build a Powerful Cybersecurity Arsenal with Free & Open Source Tools

Rapid7's avatar

Rapid7

Making Bug Reporting Easier with AWS S3 and AWS Lambda

Security Operations

Making Bug Reporting Easier with AWS S3 and AWS Lambda

Rapid7's avatar

Rapid7