The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Breaking down the Logjam (vulnerability)

Vulnerabilities and Exploits

Breaking down the Logjam (vulnerability)

Maria Varmazis's avatar

Maria Varmazis

2015 Metasploit T-Shirt Design Contest: It's On!

Products and Tools

2015 Metasploit T-Shirt Design Contest: It's On!

Maria Varmazis's avatar

Maria Varmazis

How Poisonous is VENOM (CVE-2015-3456) to your Virtual Environments?

Vulnerabilities and Exploits

How Poisonous is VENOM (CVE-2015-3456) to your Virtual Environments?

Tod Beardsley's avatar

Tod Beardsley

Availability of Metasploit Community & Metasploit Pro Trials Outside US & Canada

Rapid7 Blog

Availability of Metasploit Community & Metasploit Pro Trials Outside US & Canada

Maria Varmazis's avatar

Maria Varmazis

Top 3 Takeaways from the "PCI DSS 3.0 Update"

Exposure Management

Top 3 Takeaways from the "PCI DSS 3.0 Update"

Kelly Garofalo's avatar

Kelly Garofalo

Unicode Support in Meterpreter

Products and Tools

Unicode Support in Meterpreter

Brent Cook's avatar

Brent Cook

Meterpreter Survey 2015: You spoke, we listened, then wrote a bunch of code.

Products and Tools

Meterpreter Survey 2015: You spoke, we listened, then wrote a bunch of code.

HD Moore's avatar

HD Moore

Let's talk about metrics...

Detection and Response

Let's talk about metrics...

Wim Remes's avatar

Wim Remes

Deep Dive Into Stageless Meterpreter Payloads

Rapid7 Blog

Deep Dive Into Stageless Meterpreter Payloads

OJ Reeves's avatar

OJ Reeves

Using Host Tagging in Metasploit for Penetration Testing

Rapid7 Blog

Using Host Tagging in Metasploit for Penetration Testing

Wei Chen's avatar

Wei Chen

The Flexbox Paradigm: CSS3 Layout for Today’s Applications

Products and Tools

The Flexbox Paradigm: CSS3 Layout for Today’s Applications

Rapid7's avatar

Rapid7

The Return of Rapid7 Rapid Fire: A spirited infosec debate, round 3

Rapid7 Blog

The Return of Rapid7 Rapid Fire: A spirited infosec debate, round 3

Maria Varmazis's avatar

Maria Varmazis

MongoDB Log Analytics

Products and Tools

MongoDB Log Analytics

Rapid7's avatar

Rapid7

Weekly Metasploit Wrapup: Stageless Meterpreter and the Revenge of Stuxnet

Rapid7 Blog

Weekly Metasploit Wrapup: Stageless Meterpreter and the Revenge of Stuxnet

Tod Beardsley's avatar

Tod Beardsley

Securing Credit Lines: Eating Our Own Dogfood

Rapid7 Blog

Securing Credit Lines: Eating Our Own Dogfood

Trey Ford's avatar

Trey Ford

New Logentries Cookbook for Chef

Products and Tools

New Logentries Cookbook for Chef

Rapid7's avatar

Rapid7

Are you really protected against Group Policy Bypass and Remote Code Execution? MS15-011 & MS15-014

Rapid7 Blog

Are you really protected against Group Policy Bypass and Remote Code Execution? MS15-011 & MS15-014

Guillaume Ross's avatar

Guillaume Ross

Patch Tuesday, March 2015

Rapid7 Blog

Patch Tuesday, March 2015

dpicotte's avatar

dpicotte

Terminology Nerd War: APM, Log Analysis & More

Products and Tools

Terminology Nerd War: APM, Log Analysis & More

Rapid7's avatar

Rapid7

Tracking Web Activity by MAC Address

Detection and Response

Tracking Web Activity by MAC Address

Darragh Delaney's avatar

Darragh Delaney

Top 10 list of iOS Security Configuration GIFs you can send your friends and relatives

Rapid7 Blog

Top 10 list of iOS Security Configuration GIFs you can send your friends and relatives

Guillaume Ross's avatar

Guillaume Ross