The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

New Research: Investigating and Reversing Avionics CAN Bus Systems

Threat Research

New Research: Investigating and Reversing Avionics CAN Bus Systems

Patrick Kiley's avatar

Patrick Kiley

How to Automate Threat Hunting with SOAR for Faster Response Times

Security Operations

How to Automate Threat Hunting with SOAR for Faster Response Times

Christie Ott's avatar

Christie Ott

Metasploit Wrap-Up 7/26/19

Products and Tools

Metasploit Wrap-Up 7/26/19

Jeffrey Martin's avatar

Jeffrey Martin

Why the Modern SIEM Is in the Cloud

Detection and Response

Why the Modern SIEM Is in the Cloud

Eric Sun's avatar

Eric Sun

Ensuring Timely Remediation of Security Risks with Service-Level Agreements (SLAs) in InsightVM

Exposure Management

Ensuring Timely Remediation of Security Risks with Service-Level Agreements (SLAs) in InsightVM

Bulut Ersavas's avatar

Bulut Ersavas

Beyond Static Rules: WAF vs. RASP for Better Web Application Security

Products and Tools

Beyond Static Rules: WAF vs. RASP for Better Web Application Security

Bria Grangard's avatar

Bria Grangard

Metasploit Wrap-Up: 7/19/19

Products and Tools

Metasploit Wrap-Up: 7/19/19

Jacob Robles's avatar

Jacob Robles

Why Having the Right Team Is Vital to Advancing Security

Industry Trends

Why Having the Right Team Is Vital to Advancing Security

Bri Hand's avatar

Bri Hand

End of Sale Announced for Metasploit Community

Products and Tools

End of Sale Announced for Metasploit Community

Justin Buchanan's avatar

Justin Buchanan

Your Guide to Securing Multi-Cloud Environments in an IaaS World

Detection and Response

Your Guide to Securing Multi-Cloud Environments in an IaaS World

Meaghan Buchanan's avatar

Meaghan Buchanan

Metasploit Open Source Office Hours: Vegas 2019

Products and Tools

Metasploit Open Source Office Hours: Vegas 2019

Pearce Barry's avatar

Pearce Barry

Metasploit Wrap-Up 7/12/19

Products and Tools

Metasploit Wrap-Up 7/12/19

Erin Bleiweiss's avatar

Erin Bleiweiss

So, You Think You Can Query?

Products and Tools

So, You Think You Can Query?

Jay Godbole's avatar

Jay Godbole

Zoom Video Snooping Security Flaw (CVE-2019-13450): What You Need to Know

Vulnerabilities and Exploits

Zoom Video Snooping Security Flaw (CVE-2019-13450): What You Need to Know

Tod Beardsley's avatar

Tod Beardsley

Securing Your Cloud Environments with InsightIDR, Part 2: Amazon Web Services (AWS)

Detection and Response

Securing Your Cloud Environments with InsightIDR, Part 2: Amazon Web Services (AWS)

Eric Sun's avatar

Eric Sun

Metasploit Wrap-Up 7/5/19

Products and Tools

Metasploit Wrap-Up 7/5/19

Pearce Barry's avatar

Pearce Barry

Metasploit Wrap-Up 6/28/19

Products and Tools

Metasploit Wrap-Up 6/28/19

Shelby Pace's avatar

Shelby Pace

Securing Your Cloud Environments with InsightIDR, Part 1: Microsoft Azure

Cloud and Devops Security

Securing Your Cloud Environments with InsightIDR, Part 1: Microsoft Azure

Meaghan Buchanan's avatar

Meaghan Buchanan

Metasploit Development Diaries: Q2 2019

Products and Tools

Metasploit Development Diaries: Q2 2019

Tod Beardsley's avatar

Tod Beardsley

How Rapid7’s AWS Security Hub Integrations Increase Cloud Visibility and Automate Security Operations

Security Operations

How Rapid7’s AWS Security Hub Integrations Increase Cloud Visibility and Automate Security Operations

Aniket Menon's avatar

Aniket Menon

Rapid7 Releases Cloud Configuration Assessment Capabilities in InsightVM

Exposure Management

Rapid7 Releases Cloud Configuration Assessment Capabilities in InsightVM

Justin Buchanan's avatar

Justin Buchanan