The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Framework Open Source Installers

Products and Tools

Metasploit Framework Open Source Installers

Brent Cook's avatar

Brent Cook

Revealing Hidden Insights with Docker & timeslice()

Products and Tools

Revealing Hidden Insights with Docker & timeslice()

Rapid7's avatar

Rapid7

Adaptive Security Overview

Rapid7 Blog

Adaptive Security Overview

Leo Varela's avatar

Leo Varela

Flipping Bits in the Windows Kernel

Products and Tools

Flipping Bits in the Windows Kernel

Juan Vazquez's avatar

Juan Vazquez

Introducing LEQL: SORT()

Products and Tools

Introducing LEQL: SORT()

Rapid7's avatar

Rapid7

All Red Team, All the Time

Cloud and Devops Security

All Red Team, All the Time

boblord's avatar

boblord

Bugzilla Privileged Bug Disclosure (CVE-2015-4499)

Rapid7 Blog

Bugzilla Privileged Bug Disclosure (CVE-2015-4499)

Tod Beardsley's avatar

Tod Beardsley

Push vs Pull Security

Industry Trends

Push vs Pull Security

boblord's avatar

boblord

Do you need an Architect in a Software Company?

Products and Tools

Do you need an Architect in a Software Company?

Rapid7's avatar

Rapid7

Log Analysis for Containers

Detection and Response

Log Analysis for Containers

Rapid7's avatar

Rapid7

Common Angular Routing Challenges

Products and Tools

Common Angular Routing Challenges

Rapid7's avatar

Rapid7

UserInsight Ranks Users by Risky Behavior

Products and Tools

UserInsight Ranks Users by Risky Behavior

Christian Kirsch's avatar

Christian Kirsch

Microsoft Attack Surface Analyzer (ASA): It's for defenders too!

Rapid7 Blog

Microsoft Attack Surface Analyzer (ASA): It's for defenders too!

Guillaume Ross's avatar

Guillaume Ross

10 Phishing Countermeasures to Protect Your Organization

Exposure Management

10 Phishing Countermeasures to Protect Your Organization

Christian Kirsch's avatar

Christian Kirsch

A Debugging Session in the Kernel

Products and Tools

A Debugging Session in the Kernel

Juan Vazquez's avatar

Juan Vazquez

CISOs: Do you have enough locks on your doors?

Security Operations

CISOs: Do you have enough locks on your doors?

boblord's avatar

boblord

Top 5 Alternatives For SPAN or Mirror Ports

Detection and Response

Top 5 Alternatives For SPAN or Mirror Ports

Darragh Delaney's avatar

Darragh Delaney

Best Practices for Container Log Analysis: Part 2

Products and Tools

Best Practices for Container Log Analysis: Part 2

Rapid7's avatar

Rapid7

Best Practices for Container Log Analysis: Part 1

Products and Tools

Best Practices for Container Log Analysis: Part 1

Rapid7's avatar

Rapid7

Multiple Insecure Installation and Update Procedures for RStudio (R7-2015-10) (FIXED)

Vulnerabilities and Exploits

Multiple Insecure Installation and Update Procedures for RStudio (R7-2015-10) (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Using Reflective DLL Injection to exploit IE Elevation Policies

Vulnerabilities and Exploits

Using Reflective DLL Injection to exploit IE Elevation Policies

Juan Vazquez's avatar

Juan Vazquez