The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

CISOs: Do you have enough locks on your doors?

Security Operations

CISOs: Do you have enough locks on your doors?

boblord's avatar

boblord

Top 5 Alternatives For SPAN or Mirror Ports

Detection and Response

Top 5 Alternatives For SPAN or Mirror Ports

Darragh Delaney's avatar

Darragh Delaney

Best Practices for Container Log Analysis: Part 2

Products and Tools

Best Practices for Container Log Analysis: Part 2

Rapid7's avatar

Rapid7

Best Practices for Container Log Analysis: Part 1

Products and Tools

Best Practices for Container Log Analysis: Part 1

Rapid7's avatar

Rapid7

Multiple Insecure Installation and Update Procedures for RStudio (R7-2015-10) (FIXED)

Vulnerabilities and Exploits

Multiple Insecure Installation and Update Procedures for RStudio (R7-2015-10) (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Using Reflective DLL Injection to exploit IE Elevation Policies

Vulnerabilities and Exploits

Using Reflective DLL Injection to exploit IE Elevation Policies

Juan Vazquez's avatar

Juan Vazquez

The real challenge behind asset inventory

Threat Research

The real challenge behind asset inventory

Leo Varela's avatar

Leo Varela

What is Elastic Logging?

Products and Tools

What is Elastic Logging?

Rapid7's avatar

Rapid7

The Absence of Evidence in Breaches

Rapid7 Blog

The Absence of Evidence in Breaches

boblord's avatar

boblord

The Easy Button for Updating your Nexpose Database

Products and Tools

The Easy Button for Updating your Nexpose Database

Snow Tempest's avatar

Snow Tempest

State of Log Management for AWS

Products and Tools

State of Log Management for AWS

Rapid7's avatar

Rapid7

Using Log Aggregation Across Dev & Ops: The Pricing Advantage

Products and Tools

Using Log Aggregation Across Dev & Ops: The Pricing Advantage

Rapid7's avatar

Rapid7

Revisiting an Info Leak

Exposure Management

Revisiting an Info Leak

Juan Vazquez's avatar

Juan Vazquez

Weekly Metasploit Wrapup: Hackers of Might and Magic

Exposure Management

Weekly Metasploit Wrapup: Hackers of Might and Magic

Tod Beardsley's avatar

Tod Beardsley

Metasploit on Kali Linux 2.0

Products and Tools

Metasploit on Kali Linux 2.0

Eray Yilmaz's avatar

Eray Yilmaz

Metasploit Local Exploit Suggester: Do Less, Get More!

Products and Tools

Metasploit Local Exploit Suggester: Do Less, Get More!

Mohamed Sadek's avatar

Mohamed Sadek

Exploiting a 64-bit browser with Flash CVE-2015-5119 (Part 2)

Vulnerabilities and Exploits

Exploiting a 64-bit browser with Flash CVE-2015-5119 (Part 2)

Juan Vazquez's avatar

Juan Vazquez

Exploiting a 64-bit browser with Flash CVE-2015-5119

Vulnerabilities and Exploits

Exploiting a 64-bit browser with Flash CVE-2015-5119

Juan Vazquez's avatar

Juan Vazquez

Rapid7 Takes Las Vegas: Black Hat, BSidesLV & DEF CON ... Talks, Parties & Giveaways... phew!

Rapid7 Blog

Rapid7 Takes Las Vegas: Black Hat, BSidesLV & DEF CON ... Talks, Parties & Giveaways... phew!

Maria Varmazis's avatar

Maria Varmazis

Weekly Metasploit Wrapup: T-Shirts, T-Shirts, & Some Modules

Exposure Management

Weekly Metasploit Wrapup: T-Shirts, T-Shirts, & Some Modules

Tod Beardsley's avatar

Tod Beardsley

The Black Hat Attendee Guide Part 7a: Electronic Survival

Rapid7 Blog

The Black Hat Attendee Guide Part 7a: Electronic Survival

Mike Damm's avatar

Mike Damm