The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

12 Days of HaXmas: Opening Up My Top Secret Metasploit Time Capsule

Exposure Management

12 Days of HaXmas: Opening Up My Top Secret Metasploit Time Capsule

Wei Chen's avatar

Wei Chen

Wishing you happy holidays & a happy new year! From all of us at Rapid7

Rapid7 Blog

Wishing you happy holidays & a happy new year! From all of us at Rapid7

Maria Varmazis's avatar

Maria Varmazis

Metasploit Weekly Wrapup: Get the 411

Products and Tools

Metasploit Weekly Wrapup: Get the 411

Tod Beardsley's avatar

Tod Beardsley

Connected QA: Selenium + Log Analysis

Products and Tools

Connected QA: Selenium + Log Analysis

Rapid7's avatar

Rapid7

Is Server Monitoring Dead?

Products and Tools

Is Server Monitoring Dead?

Rapid7's avatar

Rapid7

End-to-End IoT Monitoring with Log Data

Products and Tools

End-to-End IoT Monitoring with Log Data

Rapid7's avatar

Rapid7

Patch Tuesday - December 2014

Detection and Response

Patch Tuesday - December 2014

Ross Barrett's avatar

Ross Barrett

POODLE Jr.: The Revenge - How to scan for CVE-2014-8730

Vulnerabilities and Exploits

POODLE Jr.: The Revenge - How to scan for CVE-2014-8730

Snow Tempest's avatar

Snow Tempest

Best Practices for Cloud Logging, Security, & Data Protection

Products and Tools

Best Practices for Cloud Logging, Security, & Data Protection

Rapid7's avatar

Rapid7

Amp Up and Defy Amplification Attacks -- Detecting Traffic Amplification Vulnerabilities with Nexpose

Rapid7 Blog

Amp Up and Defy Amplification Attacks -- Detecting Traffic Amplification Vulnerabilities with Nexpose

Jon Hart's avatar

Jon Hart

Good-bye msfpayload and msfencode

Products and Tools

Good-bye msfpayload and msfencode

Wei Chen's avatar

Wei Chen

Community Packs for AWS: Out of the Box Dashboards, Alerts, & Queries

Products and Tools

Community Packs for AWS: Out of the Box Dashboards, Alerts, & Queries

Rapid7's avatar

Rapid7

Keepalived and HAProxy in AWS: An Exploratory Guide

Products and Tools

Keepalived and HAProxy in AWS: An Exploratory Guide

Rapid7's avatar

Rapid7

ES6: Javascript in Harmony: An Overview of New Language Features

Products and Tools

ES6: Javascript in Harmony: An Overview of New Language Features

Rapid7's avatar

Rapid7

Patch CVE-2014-6324 To Avoid A Complete Domain Rebuild When UserInsight Detects Its Exploit

Detection and Response

Patch CVE-2014-6324 To Avoid A Complete Domain Rebuild When UserInsight Detects Its Exploit

Matt Hathaway's avatar

Matt Hathaway

Finding and Protecting mission-critical assets with ControlsInsight

Rapid7 Blog

Finding and Protecting mission-critical assets with ControlsInsight

Victor Adossi's avatar

Victor Adossi

How to Implement JSON Formatting of IIS for Analytics and Troubleshooting

Products and Tools

How to Implement JSON Formatting of IIS for Analytics and Troubleshooting

Rapid7's avatar

Rapid7

For the Love of Code: Why We Use JSHint for Static Code Analysis

Products and Tools

For the Love of Code: Why We Use JSHint for Static Code Analysis

Rapid7's avatar

Rapid7

R7-2014-18: Hikvision DVR Devices - Multiple Vulnerabilities

Vulnerabilities and Exploits

R7-2014-18: Hikvision DVR Devices - Multiple Vulnerabilities

rep's avatar

rep

Why that CVSS score? HTTP TRACE vulnerability-your questions answered

Products and Tools

Why that CVSS score? HTTP TRACE vulnerability-your questions answered

Alex Hin's avatar

Alex Hin

Patch Tuesday, November 2014

Detection and Response

Patch Tuesday, November 2014

Ross Barrett's avatar

Ross Barrett