The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Common Angular Routing Challenges

Products and Tools

Common Angular Routing Challenges

Rapid7's avatar

Rapid7

UserInsight Ranks Users by Risky Behavior

Products and Tools

UserInsight Ranks Users by Risky Behavior

Christian Kirsch's avatar

Christian Kirsch

Microsoft Attack Surface Analyzer (ASA): It's for defenders too!

Rapid7 Blog

Microsoft Attack Surface Analyzer (ASA): It's for defenders too!

Guillaume Ross's avatar

Guillaume Ross

10 Phishing Countermeasures to Protect Your Organization

Exposure Management

10 Phishing Countermeasures to Protect Your Organization

Christian Kirsch's avatar

Christian Kirsch

A Debugging Session in the Kernel

Products and Tools

A Debugging Session in the Kernel

Juan Vazquez's avatar

Juan Vazquez

CISOs: Do you have enough locks on your doors?

Security Operations

CISOs: Do you have enough locks on your doors?

boblord's avatar

boblord

Top 5 Alternatives For SPAN or Mirror Ports

Detection and Response

Top 5 Alternatives For SPAN or Mirror Ports

Darragh Delaney's avatar

Darragh Delaney

Best Practices for Container Log Analysis: Part 2

Products and Tools

Best Practices for Container Log Analysis: Part 2

Rapid7's avatar

Rapid7

Best Practices for Container Log Analysis: Part 1

Products and Tools

Best Practices for Container Log Analysis: Part 1

Rapid7's avatar

Rapid7

Multiple Insecure Installation and Update Procedures for RStudio (R7-2015-10) (FIXED)

Vulnerabilities and Exploits

Multiple Insecure Installation and Update Procedures for RStudio (R7-2015-10) (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Using Reflective DLL Injection to exploit IE Elevation Policies

Vulnerabilities and Exploits

Using Reflective DLL Injection to exploit IE Elevation Policies

Juan Vazquez's avatar

Juan Vazquez

The real challenge behind asset inventory

Threat Research

The real challenge behind asset inventory

Leo Varela's avatar

Leo Varela

What is Elastic Logging?

Products and Tools

What is Elastic Logging?

Rapid7's avatar

Rapid7

The Absence of Evidence in Breaches

Rapid7 Blog

The Absence of Evidence in Breaches

boblord's avatar

boblord

The Easy Button for Updating your Nexpose Database

Products and Tools

The Easy Button for Updating your Nexpose Database

Snow Tempest's avatar

Snow Tempest

State of Log Management for AWS

Products and Tools

State of Log Management for AWS

Rapid7's avatar

Rapid7

Using Log Aggregation Across Dev & Ops: The Pricing Advantage

Products and Tools

Using Log Aggregation Across Dev & Ops: The Pricing Advantage

Rapid7's avatar

Rapid7

Revisiting an Info Leak

Exposure Management

Revisiting an Info Leak

Juan Vazquez's avatar

Juan Vazquez

Weekly Metasploit Wrapup: Hackers of Might and Magic

Exposure Management

Weekly Metasploit Wrapup: Hackers of Might and Magic

Tod Beardsley's avatar

Tod Beardsley

Metasploit on Kali Linux 2.0

Products and Tools

Metasploit on Kali Linux 2.0

Eray Yilmaz's avatar

Eray Yilmaz

Metasploit Local Exploit Suggester: Do Less, Get More!

Products and Tools

Metasploit Local Exploit Suggester: Do Less, Get More!

Mohamed Sadek's avatar

Mohamed Sadek