The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

How SOAR Is Disrupting Traditional Vulnerability Management

Security Operations

How SOAR Is Disrupting Traditional Vulnerability Management

Justin Buchanan's avatar

Justin Buchanan

WannaCry, Two Years On: Current Threat Landscape

Detection and Response

WannaCry, Two Years On: Current Threat Landscape

boB Rudis's avatar

boB Rudis

Medical Device Security, Part 3: Putting Safe Scanning into Practice

Industry Trends

Medical Device Security, Part 3: Putting Safe Scanning into Practice

Joe Agnew's avatar

Joe Agnew

Metasploit Wrap-Up 5/10/19

Products and Tools

Metasploit Wrap-Up 5/10/19

Pearce Barry's avatar

Pearce Barry

Extracting Firmware from Microcontrollers’ 
Onboard Flash Memory, Part 4

Detection and Response

Extracting Firmware from Microcontrollers’ Onboard Flash Memory, Part 4

Deral Heiland's avatar

Deral Heiland

Medical Device Security, Part 2: How to Give Medical Devices a Security Checkup

Industry Trends

Medical Device Security, Part 2: How to Give Medical Devices a Security Checkup

Cody Florek's avatar

Cody Florek

Metasploit Wrap-Up 5/3/19

Products and Tools

Metasploit Wrap-Up 5/3/19

James Barnett's avatar

James Barnett

How InsightAppSec Can Help You Improve Your Approach to Application Security

Products and Tools

How InsightAppSec Can Help You Improve Your Approach to Application Security

Dan Kuÿkendall's avatar

Dan Kuÿkendall

Extracting Firmware from Microcontrollers' 
Onboard Flash Memory, Part 3: Microchip PIC Microcontrollers

Threat Research

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 3: Microchip PIC Microcontrollers

Deral Heiland's avatar

Deral Heiland

Medical Device Security, Part 1: How to Scan Devices Without Letting Safety Flatline

Industry Trends

Medical Device Security, Part 1: How to Scan Devices Without Letting Safety Flatline

Joe Agnew's avatar

Joe Agnew

Metasploit Wrap-Up 4/26/19

Products and Tools

Metasploit Wrap-Up 4/26/19

Wei Chen's avatar

Wei Chen

Extracting Firmware from Microcontrollers' 
Onboard Flash Memory, Part 2: Nordic RF Microcontrollers

Threat Research

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 2: Nordic RF Microcontrollers

Deral Heiland's avatar

Deral Heiland

Capture the Flag: Red Team vs. Cloud SIEM

Detection and Response

Capture the Flag: Red Team vs. Cloud SIEM

Garrett Enochs's avatar

Garrett Enochs

Metasploit Wrap-Up 4/19/19

Products and Tools

Metasploit Wrap-Up 4/19/19

Jeffrey Martin's avatar

Jeffrey Martin

How to Choose the Right Application Security Tool for Your Organization

Products and Tools

How to Choose the Right Application Security Tool for Your Organization

Coreen Wilson's avatar

Coreen Wilson

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Detection and Response

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Deral Heiland's avatar

Deral Heiland

Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know

Threat Research

Confluence Unauthorized RCE Vulnerability (CVE-2019-3396): What You Need to Know

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up 4/12/19

Products and Tools

Metasploit Wrap-Up 4/12/19

Jacob Robles's avatar

Jacob Robles

How to Start a Career in Cybersecurity: From Stay-at-Home Mom to Security Pro-in-Training

Industry Trends

How to Start a Career in Cybersecurity: From Stay-at-Home Mom to Security Pro-in-Training

Carlota Bindner's avatar

Carlota Bindner

Metasploit Wrap-Up 4/5/19

Exposure Management

Metasploit Wrap-Up 4/5/19

Erin Bleiweiss's avatar

Erin Bleiweiss

5 Considerations When Creating an Application Security Program

Products and Tools

5 Considerations When Creating an Application Security Program

Coreen Wilson's avatar

Coreen Wilson