The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
3612 Results

Threat Research
Cisco Self-Signed Certificate Expiration on Jan. 1, 2020: What You Need to Know
boB Rudis

Exposure Management
Metasploit Wrap-Up: 12/19/19
Brendan Watters

Exposure Management
The Importance of Updating and Patching Your New Electronic Presents
Justin Turcotte

Industry Trends
Building a Daily Threat Simulation Tool with Todd Beebe
Bri Hand

Products and Tools
Automating Application Security Testing Within Your Atlassian Bamboo Pipelines
Zac Youtz

Exposure Management
Metasploit Wrap-Up: Dec. 13, 2019
Christophe De La Fuente

Products and Tools
The Most Commonly Exploited Web Application Vulnerabilities in a Production Environment
Garrett Gross

Products and Tools
Building a Culture of Security Awareness: How to Use Performance Metrics to Communicate SOC Effectiveness Throughout Your Org
Meaghan Buchanan

Security Operations
Global Artifacts Now Available in InsightConnect
Tyler Terenzoni

Vulnerabilities and Exploits
IoT Vuln Disclosure: Children's GPS Smart Watches (R7-2019-57)
Tod Beardsley

Exposure Management
Patch Tuesday - December 2019
Richard Tsang

Threat Research
How I Shut Down a (Test) Factory with a Single Layer 2 Packet
Andreas Galauner

Exposure Management
Metasploit Wrap-Up: 12/6/19
Matthew Kienow

Products and Tools
Hidden Helpers: Security-Focused HTTP Headers to Protect Against Vulnerabilities
Robert Lerner

Detection and Response
InsightIDR Now Available for Purchase in AWS Marketplace
Aaron Sawitsky

Industry Trends
Discovering a New Path in Asset Discovery: A Q&A with Metasploit Founder HD Moore
Bri Hand

Exposure Management
Kilos: The Dark Web’s Newest – and Most Extensive – Search Engine
Etay Maor

Industry Trends
5 Types of Cybersecurity Attacks to Watch Out for This Black Friday and Cyber Monday
Bri Hand

Exposure Management
Metasploit Wrap-Up: 11/22/19
Adam Cammack

Security Operations
How SMBs Can Decrease Vulnerabilities and Incident Response Time with Automation
Meaghan Buchanan

Products and Tools
Metasploit Shellcode Grows Up: Encrypted and Authenticated C Shells
Shelby Pace