The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Exploiting a 64-bit browser with Flash CVE-2015-5119 (Part 2)

Vulnerabilities and Exploits

Exploiting a 64-bit browser with Flash CVE-2015-5119 (Part 2)

Juan Vazquez's avatar

Juan Vazquez

Exploiting a 64-bit browser with Flash CVE-2015-5119

Vulnerabilities and Exploits

Exploiting a 64-bit browser with Flash CVE-2015-5119

Juan Vazquez's avatar

Juan Vazquez

Rapid7 Takes Las Vegas: Black Hat, BSidesLV & DEF CON ... Talks, Parties & Giveaways... phew!

Rapid7 Blog

Rapid7 Takes Las Vegas: Black Hat, BSidesLV & DEF CON ... Talks, Parties & Giveaways... phew!

Maria Varmazis's avatar

Maria Varmazis

Weekly Metasploit Wrapup: T-Shirts, T-Shirts, & Some Modules

Exposure Management

Weekly Metasploit Wrapup: T-Shirts, T-Shirts, & Some Modules

Tod Beardsley's avatar

Tod Beardsley

The Black Hat Attendee Guide Part 7a: Electronic Survival

Rapid7 Blog

The Black Hat Attendee Guide Part 7a: Electronic Survival

Mike Damm's avatar

Mike Damm

The Black Hat Attendee Guide Part 7: Your Survival Kit

Rapid7 Blog

The Black Hat Attendee Guide Part 7: Your Survival Kit

Trey Ford's avatar

Trey Ford

The Black Hat Attendee Guide Part 6: The Sponsor Hall, Arsenal, and more

Rapid7 Blog

The Black Hat Attendee Guide Part 6: The Sponsor Hall, Arsenal, and more

Trey Ford's avatar

Trey Ford

How to Add a GPS Time Source to ntpd

Products and Tools

How to Add a GPS Time Source to ntpd

Rapid7's avatar

Rapid7

Interning at Rapid7: A "git push" in the Right Direction

Products and Tools

Interning at Rapid7: A "git push" in the Right Direction

Mohamed Sadek's avatar

Mohamed Sadek

Rapid7's Comments on the Wassenaar Arrangement Proposed Rule

Industry Trends

Rapid7's Comments on the Wassenaar Arrangement Proposed Rule

Jen Ellis's avatar

Jen Ellis

Weekly Metasploit WrapUp: A Wild Committer Appears!

Exposure Management

Weekly Metasploit WrapUp: A Wild Committer Appears!

Tod Beardsley's avatar

Tod Beardsley

The Black Hat Attendee Guide Part 5 - Meaningful Introductions

Rapid7 Blog

The Black Hat Attendee Guide Part 5 - Meaningful Introductions

Trey Ford's avatar

Trey Ford

Playing with Java 8's Completable Futures

Products and Tools

Playing with Java 8's Completable Futures

Rapid7's avatar

Rapid7

Oracle Java JRE AES Intrinsics Remote Denial of Service (CVE-2015-2659)

Vulnerabilities and Exploits

Oracle Java JRE AES Intrinsics Remote Denial of Service (CVE-2015-2659)

Tod Beardsley's avatar

Tod Beardsley

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 2

Rapid7 Blog

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 2

Wei Chen's avatar

Wei Chen

Patch Tuesday, July 2015

Rapid7 Blog

Patch Tuesday, July 2015

dpicotte's avatar

dpicotte

The Black Hat Attendee Guide Part 2 - The Briefings

Rapid7 Blog

The Black Hat Attendee Guide Part 2 - The Briefings

Trey Ford's avatar

Trey Ford

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 1

Rapid7 Blog

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 1

Wei Chen's avatar

Wei Chen

Web Application Security Scanning and the Art of Automation

Cloud and Devops Security

Web Application Security Scanning and the Art of Automation

Dan Kuÿkendall's avatar

Dan Kuÿkendall

The Black Hat Attendee Guide, Part 1 - How to Survive Black Hat

Rapid7 Blog

The Black Hat Attendee Guide, Part 1 - How to Survive Black Hat

Trey Ford's avatar

Trey Ford

R7-2015-08: Accellion File Transfer Appliance Vulnerabilities (CVE-2015-2856, CVE-2015-2857)

Vulnerabilities and Exploits

R7-2015-08: Accellion File Transfer Appliance Vulnerabilities (CVE-2015-2856, CVE-2015-2857)

Tod Beardsley's avatar

Tod Beardsley