The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Switching between UTC and local time

Products and Tools

Switching between UTC and local time

Rapid7's avatar

Rapid7

Metasploit's 10th Anniversary: Laptop Decal Design Competition

Products and Tools

Metasploit's 10th Anniversary: Laptop Decal Design Competition

Tod Beardsley's avatar

Tod Beardsley

Abusing Safari's webarchive file format

Vulnerabilities and Exploits

Abusing Safari's webarchive file format

joev's avatar

joev

Simplify Vulnerability Management with Nexpose 5.6

Exposure Management

Simplify Vulnerability Management with Nexpose 5.6

rpoppa's avatar

rpoppa

Microsoft EMET 4.0 might be the best enterprise security tool you're not using yet

Rapid7 Blog

Microsoft EMET 4.0 might be the best enterprise security tool you're not using yet

chad's avatar

chad

How To Do Internal Security Audits Remotely To Reduce Travel Costs

Exposure Management

How To Do Internal Security Audits Remotely To Reduce Travel Costs

Christian Kirsch's avatar

Christian Kirsch

Patch Tuesday - April 2013 Edition!

Exposure Management

Patch Tuesday - April 2013 Edition!

Ross Barrett's avatar

Ross Barrett

Video Tutorial: Installing Kali Linux on Virtual Box

Rapid7 Blog

Video Tutorial: Installing Kali Linux on Virtual Box

webpwnized's avatar

webpwnized

Metasploit Now Supports Plan 9, the Evolution of Unix

Rapid7 Blog

Metasploit Now Supports Plan 9, the Evolution of Unix

Tod Beardsley's avatar

Tod Beardsley

Weekly Update: Introducing Metasploit 4.5.3

Rapid7 Blog

Weekly Update: Introducing Metasploit 4.5.3

Tod Beardsley's avatar

Tod Beardsley

Internet Census 2012 - Thoughts

Rapid7 Blog

Internet Census 2012 - Thoughts

rep's avatar

rep

Calculating Your Average Scan Time

Products and Tools

Calculating Your Average Scan Time

daines's avatar

daines

Patch Tuesday - March 2013 Edition!

Rapid7 Blog

Patch Tuesday - March 2013 Edition!

Ross Barrett's avatar

Ross Barrett

Metasploit Now Supports Kali Linux, the Evolution of BackTrack

Products and Tools

Metasploit Now Supports Kali Linux, the Evolution of BackTrack

Christian Kirsch's avatar

Christian Kirsch

Exploit for new Vulnerability on Honeywell EBI ActiveX (CVE-2013-0108)

Vulnerabilities and Exploits

Exploit for new Vulnerability on Honeywell EBI ActiveX (CVE-2013-0108)

Juan Vazquez's avatar

Juan Vazquez

New Heap Spray Technique for Metasploit Browser Exploitation

Rapid7 Blog

New Heap Spray Technique for Metasploit Browser Exploitation

Wei Chen's avatar

Wei Chen

Malicious SSIDs And Web Apps

Vulnerabilities and Exploits

Malicious SSIDs And Web Apps

rapidmb's avatar

rapidmb

Making the Nexpose Gem Easier to Use

Products and Tools

Making the Nexpose Gem Easier to Use

daines's avatar

daines

Weekly Update: Splitting DNS Modules and a D-Link Auth Bypass

Products and Tools

Weekly Update: Splitting DNS Modules and a D-Link Auth Bypass

Tod Beardsley's avatar

Tod Beardsley

Per-log retention period

Products and Tools

Per-log retention period

Rapid7's avatar

Rapid7

Vulnerability Correlation -- Enabled by Default

Rapid7 Blog

Vulnerability Correlation -- Enabled by Default

Jon Hart's avatar

Jon Hart