The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Behind the Scenes: Under the Hoodie 2020 Video Series

Exposure Management

Behind the Scenes: Under the Hoodie 2020 Video Series

Bri Hand's avatar

Bri Hand

Don’t Put It on the Internet: Tesla Backup Gateway Edition

Threat Research

Don’t Put It on the Internet: Tesla Backup Gateway Edition

Derek Abdine's avatar

Derek Abdine

Defining Vulnerability Risk Management (and How to Build a Modern VRM Program)

Security Operations

Defining Vulnerability Risk Management (and How to Build a Modern VRM Program)

Vivian Ma's avatar

Vivian Ma

Metasploit Wrap-Up: 11/13/20

Exposure Management

Metasploit Wrap-Up: 11/13/20

Shelby Pace's avatar

Shelby Pace

NICER Protocol Deep Dive: Internet Exposure of MySQL

Threat Research

NICER Protocol Deep Dive: Internet Exposure of MySQL

Tod Beardsley's avatar

Tod Beardsley

2021 Detection and Response Planning, Part 4: Planning for Success with a Cloud SIEM

Detection and Response

2021 Detection and Response Planning, Part 4: Planning for Success with a Cloud SIEM

Meaghan Buchanan's avatar

Meaghan Buchanan

Patch Tuesday - November 2020

Detection and Response

Patch Tuesday - November 2020

Richard Tsang's avatar

Richard Tsang

VMware ESXi OpenSLP Remote Code Execution Vulnerability (CVE-2020-3992 and CVE-2019-5544): What You Need To Know

Exposure Management

VMware ESXi OpenSLP Remote Code Execution Vulnerability (CVE-2020-3992 and CVE-2019-5544): What You Need To Know

boB Rudis's avatar

boB Rudis

SaltStack Pre-Authenticated Remote Root (CVE-2020-16846 and CVE-2020-25592): What You Need to Know

Threat Research

SaltStack Pre-Authenticated Remote Root (CVE-2020-16846 and CVE-2020-25592): What You Need to Know

boB Rudis's avatar

boB Rudis

Visualizing Network Traffic Data to Drive Action

Detection and Response

Visualizing Network Traffic Data to Drive Action

Darragh Delaney's avatar

Darragh Delaney

Advance Your Career: Life as a Rapid7 Belfast Software Engineer

Rapid7 Blog

Advance Your Career: Life as a Rapid7 Belfast Software Engineer

Rapid7's avatar

Rapid7

Metasploit Wrap-Up: Nov. 6, 2020

Exposure Management

Metasploit Wrap-Up: Nov. 6, 2020

Matthew Kienow's avatar

Matthew Kienow

This One Time on a Pen Test: How I Hacked a Self-Driving Car

Threat Research

This One Time on a Pen Test: How I Hacked a Self-Driving Car

Jonathan Stines's avatar

Jonathan Stines

tCell by Rapid7 Now Available for the European Region

Products and Tools

tCell by Rapid7 Now Available for the European Region

Rapid7's avatar

Rapid7

NICER Protocol Deep Dive: Internet Exposure of Citrix ADC/NetScaler

Threat Research

NICER Protocol Deep Dive: Internet Exposure of Citrix ADC/NetScaler

Tod Beardsley's avatar

Tod Beardsley

The Story Behind Security Breaches

Exposure Management

The Story Behind Security Breaches

Laurel Marotta's avatar

Laurel Marotta

Overview of Content Security Policies (CSPs) on the Web

Products and Tools

Overview of Content Security Policies (CSPs) on the Web

Curt Barnard's avatar

Curt Barnard

Metasploit Wrap-Up 10/30/20

Products and Tools

Metasploit Wrap-Up 10/30/20

Christopher Granleese's avatar

Christopher Granleese

National Cybersecurity Awareness Month: Security Pros Offer Top Tips for Staying Safe Online

Industry Trends

National Cybersecurity Awareness Month: Security Pros Offer Top Tips for Staying Safe Online

Rapid7's avatar

Rapid7

Oracle WebLogic Unauthenticated Complete Takeover (CVE-2020-14882/CVE-2020-14750): What You Need to Know

Vulnerabilities and Exploits

Oracle WebLogic Unauthenticated Complete Takeover (CVE-2020-14882/CVE-2020-14750): What You Need to Know

boB Rudis's avatar

boB Rudis

Rapid7 Announces Improvements to Goals and SLAs in InsightVM

Exposure Management

Rapid7 Announces Improvements to Goals and SLAs in InsightVM

Tori Sitcawich's avatar

Tori Sitcawich