The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Java 8: A quick introduction to Parallelism and the Spliterator

Products and Tools

Java 8: A quick introduction to Parallelism and the Spliterator

Rapid7's avatar

Rapid7

New DMCA Exemption is a Positive Step for Security Researchers

Industry Trends

New DMCA Exemption is a Positive Step for Security Researchers

Jen Ellis's avatar

Jen Ellis

8 Reasons Why SQL Injection Vulnerabilities Still Exist

Vulnerabilities and Exploits

8 Reasons Why SQL Injection Vulnerabilities Still Exist

Kim Dinerman's avatar

Kim Dinerman

Mobile application security: Lock the back door!

Products and Tools

Mobile application security: Lock the back door!

Kim Dinerman's avatar

Kim Dinerman

5 Tips for Dealing with Unusual Traffic Detected Notifications

Rapid7 Blog

5 Tips for Dealing with Unusual Traffic Detected Notifications

Darragh Delaney's avatar

Darragh Delaney

Unleash the power of node.js for Shell Scripting (Part 1)

Products and Tools

Unleash the power of node.js for Shell Scripting (Part 1)

Rapid7's avatar

Rapid7

Logging from Tableau for Successful DataOps

Products and Tools

Logging from Tableau for Successful DataOps

Rapid7's avatar

Rapid7

Metasploit Weekly Wrapup for 2015-10-15

Exposure Management

Metasploit Weekly Wrapup for 2015-10-15

Brent Cook's avatar

Brent Cook

Exploring Lambdas and Streams in Java 8

Products and Tools

Exploring Lambdas and Streams in Java 8

Rapid7's avatar

Rapid7

10 Best Practices for Log Management and Analytics

Products and Tools

10 Best Practices for Log Management and Analytics

Rapid7's avatar

Rapid7

Rapid7 Labs' Project Sonar - Nexpose Integration

Threat Research

Rapid7 Labs' Project Sonar - Nexpose Integration

Brady Wunsch's avatar

Brady Wunsch

TLS Coverage Improvements in Nexpose 6.0.2

Rapid7 Blog

TLS Coverage Improvements in Nexpose 6.0.2

Greg Wiseman's avatar

Greg Wiseman

Logentries Joins the Rapid7 Family

Detection and Response

Logentries Joins the Rapid7 Family

Andrew Burton's avatar

Andrew Burton

R7-2015-17: HP SiteScope DNS Tool Command Injection

Vulnerabilities and Exploits

R7-2015-17: HP SiteScope DNS Tool Command Injection

Tod Beardsley's avatar

Tod Beardsley

Metasploit Framework Tools Reorg

Products and Tools

Metasploit Framework Tools Reorg

Brent Cook's avatar

Brent Cook

New Metasploit Tools to Collect Microsoft Patches

Products and Tools

New Metasploit Tools to Collect Microsoft Patches

Wei Chen's avatar

Wei Chen

Nexpose 6.0: Using Adaptive Security

Products and Tools

Nexpose 6.0: Using Adaptive Security

Lily Guo's avatar

Lily Guo

Metasploit Framework Open Source Installers

Products and Tools

Metasploit Framework Open Source Installers

Brent Cook's avatar

Brent Cook

Revealing Hidden Insights with Docker & timeslice()

Products and Tools

Revealing Hidden Insights with Docker & timeslice()

Rapid7's avatar

Rapid7

Adaptive Security Overview

Rapid7 Blog

Adaptive Security Overview

Leo Varela's avatar

Leo Varela

Flipping Bits in the Windows Kernel

Products and Tools

Flipping Bits in the Windows Kernel

Juan Vazquez's avatar

Juan Vazquez