The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
3672 Results

Products and Tools
How Audit Logs Help Confirm and Correct Security Policy
Rapid7

Products and Tools
Signal AND Noise The Best of All Worlds for Logging
Rapid7
![Digging for Clam[AV]s with Project Sonar](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Threat Research
Digging for Clam[AV]s with Project Sonar
boB Rudis

Products and Tools
AWS Series: Creating a Privoxy, Tor Instance
Rapid7

Products and Tools
AWS Series: OpenSWAN L2TP over IPSEC VPN Configuration
Rapid7

Products and Tools
Bro Series: Creating a Bro Cluster
Rapid7

Exposure Management
Penetration Test vs. Red Team Assessment: The Age Old Debate of Pirates vs. Ninjas Continues
Kirk Hayes

Vulnerabilities and Exploits
R7-2016-06: Remote Code Execution via Swagger Parameter Injection (CVE-2016-5641)
Scott Davis

Products and Tools
Vulnerability Regression Monitoring With Nexpose
Francisco Slavin

Products and Tools
Migrating a web app to Angular
Rapid7

Products and Tools
Seven Ways InsightIDR Helps Maintain PCI Compliance
Eric Sun

Products and Tools
Webinar Recap: Tableau Server Log Analytics
Rapid7
Security Operations
Defender Spotlight: Ryan Huber of Slack
Rapid7

Products and Tools
Monitoring SNS Activity Using a Lambda Function and Logentries
Rapid7

Products and Tools
Checking Active Directory (AD) Security and Integrity via Log Monitoring
Rapid7

Detection and Response
What are Networking Intrusion Prevention/Detection Systems?
Rapid7

Products and Tools
GDB for Fun (and Profit!)
Rapid7

Products and Tools
Exploiting Zookeeper for managing processes in a production environment with Lockex
Rapid7

Products and Tools
A Short Approach: The Cisco ASA 5505 as a Stepping Stone Into Embedded Reverse Engineering
William Webb
Security Operations
How to Create a Culture of Security Ownership Across Your Organization
Rapid7
Security Operations
SOC Series: How to Structure and Build a Security Operations Center
Rapid7