The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

The Black Hat Attendee Guide Part 7: Your Survival Kit

Rapid7 Blog

The Black Hat Attendee Guide Part 7: Your Survival Kit

Trey Ford's avatar

Trey Ford

The Black Hat Attendee Guide Part 6: The Sponsor Hall, Arsenal, and more

Rapid7 Blog

The Black Hat Attendee Guide Part 6: The Sponsor Hall, Arsenal, and more

Trey Ford's avatar

Trey Ford

How to Add a GPS Time Source to ntpd

Products and Tools

How to Add a GPS Time Source to ntpd

Rapid7's avatar

Rapid7

Interning at Rapid7: A "git push" in the Right Direction

Products and Tools

Interning at Rapid7: A "git push" in the Right Direction

Mohamed Sadek's avatar

Mohamed Sadek

Rapid7's Comments on the Wassenaar Arrangement Proposed Rule

Industry Trends

Rapid7's Comments on the Wassenaar Arrangement Proposed Rule

Jen Ellis's avatar

Jen Ellis

Weekly Metasploit WrapUp: A Wild Committer Appears!

Exposure Management

Weekly Metasploit WrapUp: A Wild Committer Appears!

Tod Beardsley's avatar

Tod Beardsley

The Black Hat Attendee Guide Part 5 - Meaningful Introductions

Rapid7 Blog

The Black Hat Attendee Guide Part 5 - Meaningful Introductions

Trey Ford's avatar

Trey Ford

Playing with Java 8's Completable Futures

Products and Tools

Playing with Java 8's Completable Futures

Rapid7's avatar

Rapid7

Oracle Java JRE AES Intrinsics Remote Denial of Service (CVE-2015-2659)

Vulnerabilities and Exploits

Oracle Java JRE AES Intrinsics Remote Denial of Service (CVE-2015-2659)

Tod Beardsley's avatar

Tod Beardsley

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 2

Rapid7 Blog

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 2

Wei Chen's avatar

Wei Chen

Patch Tuesday, July 2015

Rapid7 Blog

Patch Tuesday, July 2015

dpicotte's avatar

dpicotte

The Black Hat Attendee Guide Part 2 - The Briefings

Rapid7 Blog

The Black Hat Attendee Guide Part 2 - The Briefings

Trey Ford's avatar

Trey Ford

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 1

Rapid7 Blog

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 1

Wei Chen's avatar

Wei Chen

Web Application Security Scanning and the Art of Automation

Cloud and Devops Security

Web Application Security Scanning and the Art of Automation

Dan Kuÿkendall's avatar

Dan Kuÿkendall

The Black Hat Attendee Guide, Part 1 - How to Survive Black Hat

Rapid7 Blog

The Black Hat Attendee Guide, Part 1 - How to Survive Black Hat

Trey Ford's avatar

Trey Ford

R7-2015-08: Accellion File Transfer Appliance Vulnerabilities (CVE-2015-2856, CVE-2015-2857)

Vulnerabilities and Exploits

R7-2015-08: Accellion File Transfer Appliance Vulnerabilities (CVE-2015-2856, CVE-2015-2857)

Tod Beardsley's avatar

Tod Beardsley

Msfcli is No Longer Available in Metasploit

Rapid7 Blog

Msfcli is No Longer Available in Metasploit

Wei Chen's avatar

Wei Chen

Ditch the Debugger and Use Log Analysis Instead

Products and Tools

Ditch the Debugger and Use Log Analysis Instead

Rapid7's avatar

Rapid7

10 Best Practices for Log Management & Analytics: Part 1

Products and Tools

10 Best Practices for Log Management & Analytics: Part 1

Rapid7's avatar

Rapid7

Using Log Data Streams for Real-Time Analytics: Part 1

Products and Tools

Using Log Data Streams for Real-Time Analytics: Part 1

Rapid7's avatar

Rapid7

How to Implement ANTLR4 Autocomplete

Products and Tools

How to Implement ANTLR4 Autocomplete

Rapid7's avatar

Rapid7