The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Race to Root and Loginpalooza

Rapid7 Blog

Metasploit Race to Root and Loginpalooza

Tod Beardsley's avatar

Tod Beardsley

I don't always write my own web application fingerprints, but when I do, I use XML

Rapid7 Blog

I don't always write my own web application fingerprints, but when I do, I use XML

Tom Hart's avatar

Tom Hart

Smart Continuous Delivery Using Automated Testing

Products and Tools

Smart Continuous Delivery Using Automated Testing

Rapid7's avatar

Rapid7

4 Ways to Use Centralized Log Management for Improved Production Monitoring

Detection and Response

4 Ways to Use Centralized Log Management for Improved Production Monitoring

Rapid7's avatar

Rapid7

Microsoft False Positives: "The update is not applicable to your computer"

Products and Tools

Microsoft False Positives: "The update is not applicable to your computer"

bjohnson's avatar

bjohnson

Weekly Metasploit Update: Countdown to DEFCON

Products and Tools

Weekly Metasploit Update: Countdown to DEFCON

Tod Beardsley's avatar

Tod Beardsley

Digging Deeper on AWS: Real-time Alerting for Windows Security Events

Products and Tools

Digging Deeper on AWS: Real-time Alerting for Windows Security Events

Rapid7's avatar

Rapid7

Revisiting the Past with Logentries and Syslog

Detection and Response

Revisiting the Past with Logentries and Syslog

Rapid7's avatar

Rapid7

AWS CloudWatch Logs - Making Innovation Easier and Cheaper

Detection and Response

AWS CloudWatch Logs - Making Innovation Easier and Cheaper

Rapid7's avatar

Rapid7

Weekly Metasploit Update: Embedded Device Attacks and Automated Syntax Analysis

Detection and Response

Weekly Metasploit Update: Embedded Device Attacks and Automated Syntax Analysis

Tod Beardsley's avatar

Tod Beardsley

Logs to Metrics to JSON to Geckoboard

Security Operations

Logs to Metrics to JSON to Geckoboard

Rapid7's avatar

Rapid7

TCP or UDP for Logging – Which One to Use?

Products and Tools

TCP or UDP for Logging – Which One to Use?

Rapid7's avatar

Rapid7

Using Log Analysis to Find the .18%

Products and Tools

Using Log Analysis to Find the .18%

Rapid7's avatar

Rapid7

Weekly Metasploit Update: Another Meterpreter Evasion Option

Products and Tools

Weekly Metasploit Update: Another Meterpreter Evasion Option

Tod Beardsley's avatar

Tod Beardsley

How to Get Full Visibility of CloudTrail, CloudWatch & System Logs

Security Operations

How to Get Full Visibility of CloudTrail, CloudWatch & System Logs

Rapid7's avatar

Rapid7

Metasploit Weekly Update: Prison Break

Rapid7 Blog

Metasploit Weekly Update: Prison Break

Wei Chen's avatar

Wei Chen

Google Cloud DataFlow – A Game Changer?

Products and Tools

Google Cloud DataFlow – A Game Changer?

Rapid7's avatar

Rapid7

Gartner calls for rebalancing security budgets: invest more in detection vs. prevention

Rapid7 Blog

Gartner calls for rebalancing security budgets: invest more in detection vs. prevention

lasherdotan's avatar

lasherdotan

Top 3 Takeaways from the "Need for Speed: 5 Tips to Accelerate Incident Investigation Time" Webcast

Detection and Response

Top 3 Takeaways from the "Need for Speed: 5 Tips to Accelerate Incident Investigation Time" Webcast

Kelly Garofalo's avatar

Kelly Garofalo

Scanning time machine: Reporting on a historical scan

Rapid7 Blog

Scanning time machine: Reporting on a historical scan

Snow Tempest's avatar

Snow Tempest

Smart Integration Testing with Dropwizard, Flyway and Retrofit

Products and Tools

Smart Integration Testing with Dropwizard, Flyway and Retrofit

Rapid7's avatar

Rapid7