The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know

Threat Research

Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up 4/12/19

Products and Tools

Metasploit Wrap-Up 4/12/19

Jacob Robles's avatar

Jacob Robles

How to Start a Career in Cybersecurity: From Stay-at-Home Mom to Security Pro-in-Training

Industry Trends

How to Start a Career in Cybersecurity: From Stay-at-Home Mom to Security Pro-in-Training

Carlota Bindner's avatar

Carlota Bindner

Metasploit Wrap-Up 4/5/19

Exposure Management

Metasploit Wrap-Up 4/5/19

Erin Bleiweiss's avatar

Erin Bleiweiss

5 Considerations When Creating an Application Security Program

Products and Tools

5 Considerations When Creating an Application Security Program

Coreen Wilson's avatar

Coreen Wilson

Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know

Threat Research

Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up 3/29/19

Products and Tools

Metasploit Wrap-Up 3/29/19

Shelby Pace's avatar

Shelby Pace

Why and Where Cybercriminals Attack the Hospitality Industry

Industry Trends

Why and Where Cybercriminals Attack the Hospitality Industry

Kevin Diffily's avatar

Kevin Diffily

R7-2018-43: Username Enumeration in Okta SSO Del Auth through Response Timing

Vulnerabilities and Exploits

R7-2018-43: Username Enumeration in Okta SSO Del Auth through Response Timing

Tod Beardsley's avatar

Tod Beardsley

How to Gain Security Visibility into a Modern Environment

Rapid7 Blog

How to Gain Security Visibility into a Modern Environment

Justin Buchanan's avatar

Justin Buchanan

The IoT Cybersecurity Improvement Act of 2019

Detection and Response

The IoT Cybersecurity Improvement Act of 2019

Jen Ellis's avatar

Jen Ellis

Rapid7’s Partner Summit 2019: Thank You to Our Partners in EMEA!

Rapid7 Blog

Rapid7’s Partner Summit 2019: Thank You to Our Partners in EMEA!

Nicki Tucker's avatar

Nicki Tucker

Introducing the Metasploit Development Diaries

Threat Research

Introducing the Metasploit Development Diaries

Caitlin Condon's avatar

Caitlin Condon

Tips for a Successful Phishing Engagement

Detection and Response

Tips for a Successful Phishing Engagement

Patrick Laverty's avatar

Patrick Laverty

Metasploit Wrap-Up: Mar. 22, 2019

Products and Tools

Metasploit Wrap-Up: Mar. 22, 2019

Brendan Watters's avatar

Brendan Watters

Rapid7 Named a March 2019 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Exposure Management

Rapid7 Named a March 2019 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Justin Buchanan's avatar

Justin Buchanan

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

Products and Tools

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

Aaron Soto's avatar

Aaron Soto

Buy One Device, Get Data Free: Private Information Remains on Donated Tech

Threat Research

Buy One Device, Get Data Free: Private Information Remains on Donated Tech

Josh Frantz's avatar

Josh Frantz

Customer Perspective: How to Build an Agile Security Program in Rapidly Changing Times

Products and Tools

Customer Perspective: How to Build an Agile Security Program in Rapidly Changing Times

Chaim Mazal's avatar

Chaim Mazal

Metasploit Wrap-Up 3/15/19

Products and Tools

Metasploit Wrap-Up 3/15/19

Sonny Gonzalez's avatar

Sonny Gonzalez

Helping Kids Hack the Future: Rapid7 Supports BoSTEM Program in Pi Day Fundraiser

Industry Trends

Helping Kids Hack the Future: Rapid7 Supports BoSTEM Program in Pi Day Fundraiser

Jeff Bray's avatar

Jeff Bray