The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Automating Multi-Factor Authentication: Time-Based One-Time Passwords

Products and Tools

Automating Multi-Factor Authentication: Time-Based One-Time Passwords

Robert Lerner's avatar

Robert Lerner

Active Exploitation of Unpatched Windows Font Parsing Vulnerability

Exposure Management

Active Exploitation of Unpatched Windows Font Parsing Vulnerability

Brent Cook's avatar

Brent Cook

Cybersecurity Vulnerability Disclosure in Trade Agreements

Industry Trends

Cybersecurity Vulnerability Disclosure in Trade Agreements

Harley Geiger's avatar

Harley Geiger

Metasploit Wrap-Up: 3/20/20

Products and Tools

Metasploit Wrap-Up: 3/20/20

Shelby Pace's avatar

Shelby Pace

The Importance of Network Visibility With a Remote Workforce

Products and Tools

The Importance of Network Visibility With a Remote Workforce

Darragh Delaney's avatar

Darragh Delaney

How to Maintain Your Cybersecurity Posture in Uncertain Times

Rapid7 Blog

How to Maintain Your Cybersecurity Posture in Uncertain Times

Scott King's avatar

Scott King

Redefining How to Measure the Success of Your Vulnerability Management Program

Products and Tools

Redefining How to Measure the Success of Your Vulnerability Management Program

Justin Buchanan's avatar

Justin Buchanan

How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach

Rapid7 Blog

How Rapid7 Customer Hilltop Holdings Integrates Security Tools for a Multi-Layered Approach

Lauren Taylor's avatar

Lauren Taylor

Our Commitment to Keeping Your Organization Secure During COVID-19

Rapid7 Blog

Our Commitment to Keeping Your Organization Secure During COVID-19

Corey Thomas's avatar

Corey Thomas

How to WFH and Keep Your Digital Self Safe

Rapid7 Blog

How to WFH and Keep Your Digital Self Safe

Shawn Valle's avatar

Shawn Valle

Metasploit Wrap-Up: 3/13/20

Products and Tools

Metasploit Wrap-Up: 3/13/20

Dean Welch's avatar

Dean Welch

How to Understand the TCO and ROI of Your Vulnerability Management Program

Products and Tools

How to Understand the TCO and ROI of Your Vulnerability Management Program

Tori Sitcawich's avatar

Tori Sitcawich

CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis

Threat Research

CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability Analysis

Bryce Abdo's avatar

Bryce Abdo

3 Common Threats to Look for in Your Network Data

Detection and Response

3 Common Threats to Look for in Your Network Data

Darragh Delaney's avatar

Darragh Delaney

Why Our Future in InfoSec Depends on Automation

Security Operations

Why Our Future in InfoSec Depends on Automation

Wade Woolwine's avatar

Wade Woolwine

Patch Tuesday - March 2020

Detection and Response

Patch Tuesday - March 2020

Richard Tsang's avatar

Richard Tsang

Talking the Origins of THOTCON with Founder Nick Percoco

Industry Trends

Talking the Origins of THOTCON with Founder Nick Percoco

Bri Hand's avatar

Bri Hand

How to Secure Containers, Applications, and Serverless Environments

Products and Tools

How to Secure Containers, Applications, and Serverless Environments

Bria Grangard's avatar

Bria Grangard

Metasploit Wrap-Up 3/6/20

Exposure Management

Metasploit Wrap-Up 3/6/20

Pearce Barry's avatar

Pearce Barry

R7-2019-39 | CVE-2019-5648: LDAP Credential Exposure in Barracuda Load Balancer ADC (FIXED)

Vulnerabilities and Exploits

R7-2019-39 | CVE-2019-5648: LDAP Credential Exposure in Barracuda Load Balancer ADC (FIXED)

Sam Huckins's avatar

Sam Huckins

Lessons Learned from an Unlikely Path to My OSCP Certification

Exposure Management

Lessons Learned from an Unlikely Path to My OSCP Certification

Patrick Laverty's avatar

Patrick Laverty