The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Weekly Metasploit Update: SAP and Silverlight

Products and Tools

Weekly Metasploit Update: SAP and Silverlight

Tod Beardsley's avatar

Tod Beardsley

Logentries Add-Ons for Heroku Environment pt. 1 – CloudAMQP

Rapid7 Blog

Logentries Add-Ons for Heroku Environment pt. 1 – CloudAMQP

Rapid7's avatar

Rapid7

Log Management 101 - Where Do Logs Come From?

Detection and Response

Log Management 101 - Where Do Logs Come From?

Rapid7's avatar

Rapid7

A Pentester's Introduction to SAP & ABAP

Threat Research

A Pentester's Introduction to SAP & ABAP

Juan Vazquez's avatar

Juan Vazquez

Weekly Metasploit Update: Patching Ruby Float Conversion DoS (CVE-2013-4164)

Products and Tools

Weekly Metasploit Update: Patching Ruby Float Conversion DoS (CVE-2013-4164)

Tod Beardsley's avatar

Tod Beardsley

Weekly Metasploit Update: BrowserExploitServer (BES), IPMI, and KiTrap0D

Vulnerabilities and Exploits

Weekly Metasploit Update: BrowserExploitServer (BES), IPMI, and KiTrap0D

Tod Beardsley's avatar

Tod Beardsley

Where Are My AWS Logs?

Products and Tools

Where Are My AWS Logs?

Rapid7's avatar

Rapid7

Exploiting the Supermicro Onboard IPMI Controller

Vulnerabilities and Exploits

Exploiting the Supermicro Onboard IPMI Controller

Juan Vazquez's avatar

Juan Vazquez

November 2013 Patch Tuesday Summary

Rapid7 Blog

November 2013 Patch Tuesday Summary

Ross Barrett's avatar

Ross Barrett

New in 5.7.16 - Search, Track, and Report on Assets by Open Ports

Rapid7 Blog

New in 5.7.16 - Search, Track, and Report on Assets by Open Ports

James Green's avatar

James Green

Tech Preview Feedback: Vulnerability Validation in Metasploit Pro 4.8

Products and Tools

Tech Preview Feedback: Vulnerability Validation in Metasploit Pro 4.8

dthree's avatar

dthree

Don't Get Blindsided: Better Visibility Into User and Asset Risks with Metasploit 4.8

Detection and Response

Don't Get Blindsided: Better Visibility Into User and Asset Risks with Metasploit 4.8

Christian Kirsch's avatar

Christian Kirsch

Network complexity: Bad for Business, Great for Job Security

Rapid7 Blog

Network complexity: Bad for Business, Great for Job Security

kevinbeaver's avatar

kevinbeaver

Learn to Pentest SAP with Metasploit As ERP Attacks Go Mainstream

Threat Research

Learn to Pentest SAP with Metasploit As ERP Attacks Go Mainstream

Christian Kirsch's avatar

Christian Kirsch

CTF365: A New Capture The Flag Platform for Ongoing Competitions

Rapid7 Blog

CTF365: A New Capture The Flag Platform for Ongoing Competitions

Marius Corici's avatar

Marius Corici

Weekly Update - 11/6/13

Products and Tools

Weekly Update - 11/6/13

Tod Beardsley's avatar

Tod Beardsley

Supermicro IPMI Firmware Vulnerabilities

Exposure Management

Supermicro IPMI Firmware Vulnerabilities

HD Moore's avatar

HD Moore

Vulnerability Management And Expert Systems

Rapid7 Blog

Vulnerability Management And Expert Systems

Jon Hart's avatar

Jon Hart

National Cyber Security Awareness Month: The Value of Vigilance

Industry Trends

National Cyber Security Awareness Month: The Value of Vigilance

Jen Ellis's avatar

Jen Ellis

Nightmare on Pwn Street

Threat Research

Nightmare on Pwn Street

Patrick Hellen's avatar

Patrick Hellen

Seven FOSS Tricks and Treats (Part One)

Exposure Management

Seven FOSS Tricks and Treats (Part One)

Tod Beardsley's avatar

Tod Beardsley