The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrap-Up: 12/11/20

Exposure Management

Metasploit Wrap-Up: 12/11/20

Spencer McIntyre's avatar

Spencer McIntyre

NICER Protocol Deep Dive: Internet Exposure of etcd

Exposure Management

NICER Protocol Deep Dive: Internet Exposure of etcd

Tod Beardsley's avatar

Tod Beardsley

New All Apps and Asset Report Combines Power of InsightVM and InsightAppSec for Boosted Visibility

Exposure Management

New All Apps and Asset Report Combines Power of InsightVM and InsightAppSec for Boosted Visibility

Bria Grangard's avatar

Bria Grangard

2020 Under the Hoodie Report Reveals Pen Testers’ Most-Loved Vulnerabilities

Products and Tools

2020 Under the Hoodie Report Reveals Pen Testers’ Most-Loved Vulnerabilities

Rapid7's avatar

Rapid7

Congrats to the Winners of the 2020 December Metasploit Community CTF

Products and Tools

Congrats to the Winners of the 2020 December Metasploit Community CTF

Alan David Foster's avatar

Alan David Foster

NICER Protocol Deep Dive: Internet Exposure of memcached

Threat Research

NICER Protocol Deep Dive: Internet Exposure of memcached

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrap-Up: 12/4/20

Exposure Management

Metasploit Wrap-Up: 12/4/20

Brendan Watters's avatar

Brendan Watters

How to Create an OS-Based Policy Scanning Workflow in InsightVM

Exposure Management

How to Create an OS-Based Policy Scanning Workflow in InsightVM

Landon Dalke's avatar

Landon Dalke

Rapid7’s InsightIDR Introduces Integration with Cybereason

Products and Tools

Rapid7’s InsightIDR Introduces Integration with Cybereason

Margaret Wei's avatar

Margaret Wei

A Holistic Approach to Kubernetes Security and Compliance

Products and Tools

A Holistic Approach to Kubernetes Security and Compliance

Rapid7's avatar

Rapid7

Threat and Vulnerability Management Best Practices

Products and Tools

Threat and Vulnerability Management Best Practices

Tori Sitcawich's avatar

Tori Sitcawich

Rapid7 Recognized as a Strong Performer Among Security Analytics Providers by Leading Industry Report

Threat Research

Rapid7 Recognized as a Strong Performer Among Security Analytics Providers by Leading Industry Report

Meaghan Buchanan's avatar

Meaghan Buchanan

NICER Protocol Deep Dive: Internet Exposure of Redis

Exposure Management

NICER Protocol Deep Dive: Internet Exposure of Redis

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrap-Up 11/27/20

Exposure Management

Metasploit Wrap-Up 11/27/20

Christophe De La Fuente's avatar

Christophe De La Fuente

CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)

Vulnerabilities and Exploits

CVE-2020-7378: OpenCRX Unverified Password Change (FIXED)

Tod Beardsley's avatar

Tod Beardsley

Don’t Let These Top Cloud Myths Hamper Your Business Decision-Making

Cloud and Devops Security

Don’t Let These Top Cloud Myths Hamper Your Business Decision-Making

Rapid7's avatar

Rapid7

NICER Protocol Deep Dive: Internet Exposure of Microsoft SQL Server (MS SQL) (UDP/1434)

Threat Research

NICER Protocol Deep Dive: Internet Exposure of Microsoft SQL Server (MS SQL) (UDP/1434)

Tod Beardsley's avatar

Tod Beardsley

Metasploit Wrap-Up: 11/20/20

Exposure Management

Metasploit Wrap-Up: 11/20/20

Adam Cammack's avatar

Adam Cammack

Announcing the 2020 December Metasploit Community CTF

Products and Tools

Announcing the 2020 December Metasploit Community CTF

Alan David Foster's avatar

Alan David Foster

This One Time on a Pen Test: CSRF to Password Reset Phishing

Exposure Management

This One Time on a Pen Test: CSRF to Password Reset Phishing

Ted Raffle's avatar

Ted Raffle

Congress unanimously passes federal IoT security law

Detection and Response

Congress unanimously passes federal IoT security law

Harley Geiger's avatar

Harley Geiger