The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

How To Do Internal Security Audits Remotely To Reduce Travel Costs

Exposure Management

How To Do Internal Security Audits Remotely To Reduce Travel Costs

Christian Kirsch's avatar

Christian Kirsch

Patch Tuesday - April 2013 Edition!

Exposure Management

Patch Tuesday - April 2013 Edition!

Ross Barrett's avatar

Ross Barrett

Video Tutorial: Installing Kali Linux on Virtual Box

Rapid7 Blog

Video Tutorial: Installing Kali Linux on Virtual Box

webpwnized's avatar

webpwnized

Metasploit Now Supports Plan 9, the Evolution of Unix

Rapid7 Blog

Metasploit Now Supports Plan 9, the Evolution of Unix

Tod Beardsley's avatar

Tod Beardsley

Weekly Update: Introducing Metasploit 4.5.3

Rapid7 Blog

Weekly Update: Introducing Metasploit 4.5.3

Tod Beardsley's avatar

Tod Beardsley

Internet Census 2012 - Thoughts

Rapid7 Blog

Internet Census 2012 - Thoughts

rep's avatar

rep

Calculating Your Average Scan Time

Products and Tools

Calculating Your Average Scan Time

daines's avatar

daines

Patch Tuesday - March 2013 Edition!

Rapid7 Blog

Patch Tuesday - March 2013 Edition!

Ross Barrett's avatar

Ross Barrett

Metasploit Now Supports Kali Linux, the Evolution of BackTrack

Products and Tools

Metasploit Now Supports Kali Linux, the Evolution of BackTrack

Christian Kirsch's avatar

Christian Kirsch

Exploit for new Vulnerability on Honeywell EBI ActiveX (CVE-2013-0108)

Vulnerabilities and Exploits

Exploit for new Vulnerability on Honeywell EBI ActiveX (CVE-2013-0108)

Juan Vazquez's avatar

Juan Vazquez

New Heap Spray Technique for Metasploit Browser Exploitation

Rapid7 Blog

New Heap Spray Technique for Metasploit Browser Exploitation

Wei Chen's avatar

Wei Chen

Malicious SSIDs And Web Apps

Vulnerabilities and Exploits

Malicious SSIDs And Web Apps

rapidmb's avatar

rapidmb

Making the Nexpose Gem Easier to Use

Products and Tools

Making the Nexpose Gem Easier to Use

daines's avatar

daines

Weekly Update: Splitting DNS Modules and a D-Link Auth Bypass

Products and Tools

Weekly Update: Splitting DNS Modules and a D-Link Auth Bypass

Tod Beardsley's avatar

Tod Beardsley

Per-log retention period

Products and Tools

Per-log retention period

Rapid7's avatar

Rapid7

Vulnerability Correlation -- Enabled by Default

Rapid7 Blog

Vulnerability Correlation -- Enabled by Default

Jon Hart's avatar

Jon Hart

Weekly Update: Corelan, MSFTidy, and UNC Path Injection

Products and Tools

Weekly Update: Corelan, MSFTidy, and UNC Path Injection

Tod Beardsley's avatar

Tod Beardsley

How to Verify that the Payload Can Connect Back to Metasploit on a NATed Network

Products and Tools

How to Verify that the Payload Can Connect Back to Metasploit on a NATed Network

Christian Kirsch's avatar

Christian Kirsch

Patch Tuesday - February 2013 Edition!

Rapid7 Blog

Patch Tuesday - February 2013 Edition!

Ross Barrett's avatar

Ross Barrett

Getting Started with the Nexpose Virtual Appliance

Products and Tools

Getting Started with the Nexpose Virtual Appliance

Rapid7 Support's avatar

Rapid7 Support

Security Flaws in Universal Plug and Play: Unplug, Don't Play

Products and Tools

Security Flaws in Universal Plug and Play: Unplug, Don't Play

HD Moore's avatar

HD Moore