The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Nexpose API: SiteSaveRequest and IP Addresses vs Host Names

Products and Tools

Nexpose API: SiteSaveRequest and IP Addresses vs Host Names

Gavin Schneider's avatar

Gavin Schneider

SChannel and MS14-066, another Red Alert?

Detection and Response

SChannel and MS14-066, another Red Alert?

Josh Feinblum's avatar

Josh Feinblum

JSON Formatting of Windows Events: It's Hot!

Products and Tools

JSON Formatting of Windows Events: It's Hot!

Rapid7's avatar

Rapid7

Securing the Shadow IT: How to Enable Secure Cloud Services for Your Business

Cloud and Devops Security

Securing the Shadow IT: How to Enable Secure Cloud Services for Your Business

Christian Kirsch's avatar

Christian Kirsch

Detecting Compromised Amazon Web Services (AWS) Accounts

Detection and Response

Detecting Compromised Amazon Web Services (AWS) Accounts

Christian Kirsch's avatar

Christian Kirsch

Unlimited Logging: A New Chapter in Log Management

Products and Tools

Unlimited Logging: A New Chapter in Log Management

Rapid7's avatar

Rapid7

The Role of Logging in the Internet of Things

Products and Tools

The Role of Logging in the Internet of Things

Rapid7's avatar

Rapid7

What Is JSON? An Introductory Guide

Products and Tools

What Is JSON? An Introductory Guide

Rapid7's avatar

Rapid7

Top 3 Takeaways from "CyberSecurity Awareness Panel: Taking it to the C-Level and Beyond"

Industry Trends

Top 3 Takeaways from "CyberSecurity Awareness Panel: Taking it to the C-Level and Beyond"

Meredith Tufts's avatar

Meredith Tufts

Logging Activity in a Smart Home

Products and Tools

Logging Activity in a Smart Home

Rapid7's avatar

Rapid7

R7-2014-15: GNU Wget FTP Symlink Arbitrary Filesystem Access

Vulnerabilities and Exploits

R7-2014-15: GNU Wget FTP Symlink Arbitrary Filesystem Access

HD Moore's avatar

HD Moore

Improve your scan performance with Scan Engine pooling

Products and Tools

Improve your scan performance with Scan Engine pooling

Rebecca Carter's avatar

Rebecca Carter

Noise Canceling Security: Extract More Value From IPS/IDS, Firewalls, and Anti-Virus

Detection and Response

Noise Canceling Security: Extract More Value From IPS/IDS, Firewalls, and Anti-Virus

Matt Hathaway's avatar

Matt Hathaway

Shared Services: The Unicorn Every DevOps is Looking For

Products and Tools

Shared Services: The Unicorn Every DevOps is Looking For

Rapid7's avatar

Rapid7

R7-2014-17: NAT-PMP Implementation and Configuration Vulnerabilities

Threat Research

R7-2014-17: NAT-PMP Implementation and Configuration Vulnerabilities

Jon Hart's avatar

Jon Hart

Five Years of Metasploit at Rapid7

Products and Tools

Five Years of Metasploit at Rapid7

Tod Beardsley's avatar

Tod Beardsley

4 Alerts You Need In Case System Events Stop Occurring

Products and Tools

4 Alerts You Need In Case System Events Stop Occurring

Rapid7's avatar

Rapid7

Site Consolidation with the Nexpose Gem

Products and Tools

Site Consolidation with the Nexpose Gem

daines's avatar

daines

Block the POODLE's bite: How to scan for CVE-2014-3566

Vulnerabilities and Exploits

Block the POODLE's bite: How to scan for CVE-2014-3566

Snow Tempest's avatar

Snow Tempest

POODLE Unleashed: Understanding the SSL 3.0 Vulnerability

Products and Tools

POODLE Unleashed: Understanding the SSL 3.0 Vulnerability

Jen Ellis's avatar

Jen Ellis

October Patch Tuesday + Sandworm

Detection and Response

October Patch Tuesday + Sandworm

Ross Barrett's avatar

Ross Barrett