The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Forrester Tech Tide for Detection and Response: Is 2019 the Year of Convergence?

Threat Research

Forrester Tech Tide for Detection and Response: Is 2019 the Year of Convergence?

Eric Sun's avatar

Eric Sun

Utilize File Integrity Monitoring to Address Critical Compliance Needs

Detection and Response

Utilize File Integrity Monitoring to Address Critical Compliance Needs

Alex Teng's avatar

Alex Teng

Patch Tuesday - March 2019

Exposure Management

Patch Tuesday - March 2019

Greg Wiseman's avatar

Greg Wiseman

R7-2019-01: CircuitWerkes Sicon-8 Client-Side Authentication Read-Only Bypass (CVE-2019-5616)

Vulnerabilities and Exploits

R7-2019-01: CircuitWerkes Sicon-8 Client-Side Authentication Read-Only Bypass (CVE-2019-5616)

Tod Beardsley's avatar

Tod Beardsley

Rapid7 Introduces Industry Cyber-Exposure Report: ASX 200

Threat Research

Rapid7 Introduces Industry Cyber-Exposure Report: ASX 200

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up 3/8/19

Exposure Management

Metasploit Wrap-Up 3/8/19

Matthew Kienow's avatar

Matthew Kienow

Seasoned Pros Share Career Advice for Cybersecurity Success

Industry Trends

Seasoned Pros Share Career Advice for Cybersecurity Success

Bri Hand's avatar

Bri Hand

Metasploit Wrap-Up 3/1/19

Products and Tools

Metasploit Wrap-Up 3/1/19

Aaron Soto's avatar

Aaron Soto

Cisco® RV110/RV130/RV215 Unauthenticated Configuration Export Vulnerability (CVE-2019-1663): What You Need to Know

Threat Research

Cisco® RV110/RV130/RV215 Unauthenticated Configuration Export Vulnerability (CVE-2019-1663): What You Need to Know

boB Rudis's avatar

boB Rudis

How Security Automation Enables Business Agility

Products and Tools

How Security Automation Enables Business Agility

Sydney Coffaro's avatar

Sydney Coffaro

Why Most Vulnerability Management Programs Fail and What You Can Do About It

Products and Tools

Why Most Vulnerability Management Programs Fail and What You Can Do About It

Brian Carey's avatar

Brian Carey

Checkmate! How to Win at Vulnerability Management Using the Game of Chess

Products and Tools

Checkmate! How to Win at Vulnerability Management Using the Game of Chess

Nadean Tanner's avatar

Nadean Tanner

Metasploit Wrap-Up 2/22/19

Products and Tools

Metasploit Wrap-Up 2/22/19

Adam Cammack's avatar

Adam Cammack

Drupal Core Remote Code Execution (CVE-2019-6340): What You Need to Know

Threat Research

Drupal Core Remote Code Execution (CVE-2019-6340): What You Need to Know

boB Rudis's avatar

boB Rudis

[IoT Security] Introduction to Embedded Hardware Hacking

Threat Research

[IoT Security] Introduction to Embedded Hardware Hacking

Deral Heiland's avatar

Deral Heiland

Stack-Based Buffer Overflow Attacks: Explained and Examples

Vulnerabilities and Exploits

Stack-Based Buffer Overflow Attacks: Explained and Examples

Brendan Watters's avatar

Brendan Watters

Metasploit Wrap-Up 2/15/19

Products and Tools

Metasploit Wrap-Up 2/15/19

William Vu's avatar

William Vu

Level Up Your Internet Intelligence Using the Rapid7 Open Data API and R

Threat Research

Level Up Your Internet Intelligence Using the Rapid7 Open Data API and R

boB Rudis's avatar

boB Rudis

Patch Tuesday - February 2019

Exposure Management

Patch Tuesday - February 2019

Greg Wiseman's avatar

Greg Wiseman

Metasploit Wrap-Up 2/8/19

Products and Tools

Metasploit Wrap-Up 2/8/19

Pearce Barry's avatar

Pearce Barry

How to Alert on Rogue DHCP Servers

Detection and Response

How to Alert on Rogue DHCP Servers

Rapid7's avatar

Rapid7