The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Capture the Flag: Red Team vs. Cloud SIEM

Detection and Response

Capture the Flag: Red Team vs. Cloud SIEM

Garrett Enochs's avatar

Garrett Enochs

Metasploit Wrap-Up 4/19/19

Products and Tools

Metasploit Wrap-Up 4/19/19

Jeffrey Martin's avatar

Jeffrey Martin

How to Choose the Right Application Security Tool for Your Organization

Products and Tools

How to Choose the Right Application Security Tool for Your Organization

Coreen Wilson's avatar

Coreen Wilson

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Detection and Response

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Deral Heiland's avatar

Deral Heiland

Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know

Threat Research

Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up 4/12/19

Products and Tools

Metasploit Wrap-Up 4/12/19

Jacob Robles's avatar

Jacob Robles

How to Start a Career in Cybersecurity: From Stay-at-Home Mom to Security Pro-in-Training

Industry Trends

How to Start a Career in Cybersecurity: From Stay-at-Home Mom to Security Pro-in-Training

Carlota Bindner's avatar

Carlota Bindner

Metasploit Wrap-Up 4/5/19

Exposure Management

Metasploit Wrap-Up 4/5/19

Erin Bleiweiss's avatar

Erin Bleiweiss

5 Considerations When Creating an Application Security Program

Products and Tools

5 Considerations When Creating an Application Security Program

Coreen Wilson's avatar

Coreen Wilson

Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know

Threat Research

Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up 3/29/19

Products and Tools

Metasploit Wrap-Up 3/29/19

Shelby Pace's avatar

Shelby Pace

Why and Where Cybercriminals Attack the Hospitality Industry

Industry Trends

Why and Where Cybercriminals Attack the Hospitality Industry

Kevin Diffily's avatar

Kevin Diffily

R7-2018-43: Username Enumeration in Okta SSO Del Auth through Response Timing

Vulnerabilities and Exploits

R7-2018-43: Username Enumeration in Okta SSO Del Auth through Response Timing

Tod Beardsley's avatar

Tod Beardsley

How to Gain Security Visibility into a Modern Environment

Rapid7 Blog

How to Gain Security Visibility into a Modern Environment

Justin Buchanan's avatar

Justin Buchanan

The IoT Cybersecurity Improvement Act of 2019

Detection and Response

The IoT Cybersecurity Improvement Act of 2019

Jen Ellis's avatar

Jen Ellis

Rapid7’s Partner Summit 2019: Thank You to Our Partners in EMEA!

Rapid7 Blog

Rapid7’s Partner Summit 2019: Thank You to Our Partners in EMEA!

Nicki Tucker's avatar

Nicki Tucker

Introducing the Metasploit Development Diaries

Threat Research

Introducing the Metasploit Development Diaries

Caitlin Condon's avatar

Caitlin Condon

Tips for a Successful Phishing Engagement

Detection and Response

Tips for a Successful Phishing Engagement

Patrick Laverty's avatar

Patrick Laverty

Metasploit Wrap-Up: Mar. 22, 2019

Products and Tools

Metasploit Wrap-Up: Mar. 22, 2019

Brendan Watters's avatar

Brendan Watters

Rapid7 Named a March 2019 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Exposure Management

Rapid7 Named a March 2019 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Justin Buchanan's avatar

Justin Buchanan

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

Products and Tools

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

Aaron Soto's avatar

Aaron Soto