The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

4 Alerts You Need In Case System Events Stop Occurring

Products and Tools

4 Alerts You Need In Case System Events Stop Occurring

Rapid7's avatar

Rapid7

Site Consolidation with the Nexpose Gem

Products and Tools

Site Consolidation with the Nexpose Gem

daines's avatar

daines

Block the POODLE's bite: How to scan for CVE-2014-3566

Vulnerabilities and Exploits

Block the POODLE's bite: How to scan for CVE-2014-3566

Snow Tempest's avatar

Snow Tempest

POODLE Unleashed: Understanding the SSL 3.0 Vulnerability

Rapid7 Blog

POODLE Unleashed: Understanding the SSL 3.0 Vulnerability

Jen Ellis's avatar

Jen Ellis

October Patch Tuesday + Sandworm

Detection and Response

October Patch Tuesday + Sandworm

Ross Barrett's avatar

Ross Barrett

Sandworm aka CVE-2014-4114

Rapid7 Blog

Sandworm aka CVE-2014-4114

Ross Barrett's avatar

Ross Barrett

How to Format Nginx and Django Logs Using KVPs

Products and Tools

How to Format Nginx and Django Logs Using KVPs

Rapid7's avatar

Rapid7

Logs: The Most Fine-grained Data Source

Products and Tools

Logs: The Most Fine-grained Data Source

Rapid7's avatar

Rapid7

Petition for Reform of the DMCA and CFAA

Threat Research

Petition for Reform of the DMCA and CFAA

Jen Ellis's avatar

Jen Ellis

Adventures in Empty UDP Scanning

Rapid7 Blog

Adventures in Empty UDP Scanning

Jon Hart's avatar

Jon Hart

How to Master the Installation of the Windows Agent

Products and Tools

How to Master the Installation of the Windows Agent

Rapid7's avatar

Rapid7

Scan Export/Import Using the nexpose-client Gem

Products and Tools

Scan Export/Import Using the nexpose-client Gem

daines's avatar

daines

In the Log Management World: Are you a Fox or Hedgehog?

Detection and Response

In the Log Management World: Are you a Fox or Hedgehog?

Rapid7's avatar

Rapid7

UserInsight Integrates with LogRhythm SIEM to Accelerate Incident Detection and Response

Detection and Response

UserInsight Integrates with LogRhythm SIEM to Accelerate Incident Detection and Response

Christian Kirsch's avatar

Christian Kirsch

Protect Your Service Accounts: Detecting Service Accounts Authenticating from a New Host

Detection and Response

Protect Your Service Accounts: Detecting Service Accounts Authenticating from a New Host

Christian Kirsch's avatar

Christian Kirsch

Heroku Buttons Rock!

Products and Tools

Heroku Buttons Rock!

Rapid7's avatar

Rapid7

Get HP ArcSight Alerts on Compromised Credentials, Phishing Attacks and Suspicious Behavior

Detection and Response

Get HP ArcSight Alerts on Compromised Credentials, Phishing Attacks and Suspicious Behavior

Christian Kirsch's avatar

Christian Kirsch

Logging from PHP Web Frameworks like Laravel

Products and Tools

Logging from PHP Web Frameworks like Laravel

Rapid7's avatar

Rapid7

UserInsight Gets the All-Clear for ShellShock and Helps Detect Attackers on Your Network

Vulnerabilities and Exploits

UserInsight Gets the All-Clear for ShellShock and Helps Detect Attackers on Your Network

Christian Kirsch's avatar

Christian Kirsch

Bash the bash bug: Here's how to scan for CVE-2014-6271 (Shellshock)

Vulnerabilities and Exploits

Bash the bash bug: Here's how to scan for CVE-2014-6271 (Shellshock)

Snow Tempest's avatar

Snow Tempest

Working with reports and exports via the RPC API

Cloud and Devops Security

Working with reports and exports via the RPC API

Sam Huckins's avatar

Sam Huckins