The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrap-Up 10/18/19

Exposure Management

Metasploit Wrap-Up 10/18/19

Louis Sato's avatar

Louis Sato

What a Difference a Year Makes: Revisiting Our Inaugural Fortune 500 ICER One Year Later

Threat Research

What a Difference a Year Makes: Revisiting Our Inaugural Fortune 500 ICER One Year Later

boB Rudis's avatar

boB Rudis

InsightVM vs. Managed Vulnerability Management: How to Choose Which Rapid7 Offering Is Right for You

Exposure Management

InsightVM vs. Managed Vulnerability Management: How to Choose Which Rapid7 Offering Is Right for You

Maggie Rodriguez's avatar

Maggie Rodriguez

Import External Threat Intelligence with the InsightIDR Threats API

Detection and Response

Import External Threat Intelligence with the InsightIDR Threats API

Teresa Copple's avatar

Teresa Copple

How BlackICE Creator Rob Graham Became a Security Textbook Author

Industry Trends

How BlackICE Creator Rob Graham Became a Security Textbook Author

Bri Hand's avatar

Bri Hand

Introducing the Rapid7 InsightConnect App for Splunk

Products and Tools

Introducing the Rapid7 InsightConnect App for Splunk

Mike Rinehart's avatar

Mike Rinehart

Metasploit Wrap-Up 10/11/19

Exposure Management

Metasploit Wrap-Up 10/11/19

Erin Bleiweiss's avatar

Erin Bleiweiss

Rapid7 Introduces Industry Cyber-Exposure Report: Deutsche Börse Prime Standard 320

Threat Research

Rapid7 Introduces Industry Cyber-Exposure Report: Deutsche Börse Prime Standard 320

Tod Beardsley's avatar

Tod Beardsley

How to Reduce Exposure in the Cloud

Cloud and Devops Security

How to Reduce Exposure in the Cloud

Aaron Sawitsky's avatar

Aaron Sawitsky

Patch Tuesday - October 2019

Exposure Management

Patch Tuesday - October 2019

Greg Wiseman's avatar

Greg Wiseman

R7-2019-32: Denial-of-Service Vulnerabilities in Beckhoff TwinCAT PLC Environment

Threat Research

R7-2019-32: Denial-of-Service Vulnerabilities in Beckhoff TwinCAT PLC Environment

Tod Beardsley's avatar

Tod Beardsley

Why Do Managed Detection and Response (MDR) Services Exist in a World Dominated by MSSPs?

Products and Tools

Why Do Managed Detection and Response (MDR) Services Exist in a World Dominated by MSSPs?

Jake Godgart's avatar

Jake Godgart

Metasploit Wrap-Up 10/4/19

Exposure Management

Metasploit Wrap-Up 10/4/19

Dean Welch's avatar

Dean Welch

This One Time on a Pen Test: “Let Me Get That for You”

Exposure Management

This One Time on a Pen Test: “Let Me Get That for You”

Trevor O'Donnal's avatar

Trevor O'Donnal

SAML All the Things! A Deep Dive into SAML SSO

Rapid7 Blog

SAML All the Things! A Deep Dive into SAML SSO

Elijah A. Martin-Merrill's avatar

Elijah A. Martin-Merrill

Open-Source Command and Control of the DOUBLEPULSAR Implant

Products and Tools

Open-Source Command and Control of the DOUBLEPULSAR Implant

William Vu's avatar

William Vu

Exim Vulnerability (CVE-2019-16928): Global Exposure Details and Remediation Advice

Products and Tools

Exim Vulnerability (CVE-2019-16928): Global Exposure Details and Remediation Advice

Kwan Lin's avatar

Kwan Lin

How DHS and MITRE Collaborate to Validate Vulns

Products and Tools

How DHS and MITRE Collaborate to Validate Vulns

Bri Hand's avatar

Bri Hand

DAST vs. SAST: Which solution is better?

Products and Tools

DAST vs. SAST: Which solution is better?

Vivian Ma's avatar

Vivian Ma

Metasploit Wrap-Up 9/27/19

Products and Tools

Metasploit Wrap-Up 9/27/19

Shelby Pace's avatar

Shelby Pace

This One Time on a Pen Test: Our Accidental Win

Threat Research

This One Time on a Pen Test: Our Accidental Win

Ted Raffle's avatar

Ted Raffle