The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know

Threat Research

Apache HTTP Server Privilege Escalation (CVE-2019-0211): What You Need to Know

boB Rudis's avatar

boB Rudis

Metasploit Wrap-Up 3/29/19

Products and Tools

Metasploit Wrap-Up 3/29/19

Shelby Pace's avatar

Shelby Pace

Why and Where Cybercriminals Attack the Hospitality Industry

Industry Trends

Why and Where Cybercriminals Attack the Hospitality Industry

Kevin Diffily's avatar

Kevin Diffily

R7-2018-43: Username Enumeration in Okta SSO Del Auth through Response Timing

Vulnerabilities and Exploits

R7-2018-43: Username Enumeration in Okta SSO Del Auth through Response Timing

Tod Beardsley's avatar

Tod Beardsley

How to Gain Security Visibility into a Modern Environment

Rapid7 Blog

How to Gain Security Visibility into a Modern Environment

Justin Buchanan's avatar

Justin Buchanan

The IoT Cybersecurity Improvement Act of 2019

Detection and Response

The IoT Cybersecurity Improvement Act of 2019

Jen Ellis's avatar

Jen Ellis

Rapid7’s Partner Summit 2019: Thank You to Our Partners in EMEA!

Rapid7 Blog

Rapid7’s Partner Summit 2019: Thank You to Our Partners in EMEA!

Nicki Tucker's avatar

Nicki Tucker

Introducing the Metasploit Development Diaries

Threat Research

Introducing the Metasploit Development Diaries

Caitlin Condon's avatar

Caitlin Condon

Tips for a Successful Phishing Engagement

Detection and Response

Tips for a Successful Phishing Engagement

Patrick Laverty's avatar

Patrick Laverty

Metasploit Wrap-Up: Mar. 22, 2019

Products and Tools

Metasploit Wrap-Up: Mar. 22, 2019

Brendan Watters's avatar

Brendan Watters

Rapid7 Named a March 2019 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Exposure Management

Rapid7 Named a March 2019 Gartner Peer Insights Customers’ Choice for Vulnerability Assessment

Justin Buchanan's avatar

Justin Buchanan

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

Products and Tools

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

Aaron Soto's avatar

Aaron Soto

Buy One Device, Get Data Free: Private Information Remains on Donated Tech

Threat Research

Buy One Device, Get Data Free: Private Information Remains on Donated Tech

Josh Frantz's avatar

Josh Frantz

Customer Perspective: How to Build an Agile Security Program in Rapidly Changing Times

Products and Tools

Customer Perspective: How to Build an Agile Security Program in Rapidly Changing Times

Chaim Mazal's avatar

Chaim Mazal

Metasploit Wrap-Up 3/15/19

Products and Tools

Metasploit Wrap-Up 3/15/19

Sonny Gonzalez's avatar

Sonny Gonzalez

Helping Kids Hack the Future: Rapid7 Supports BoSTEM Program in Pi Day Fundraiser

Industry Trends

Helping Kids Hack the Future: Rapid7 Supports BoSTEM Program in Pi Day Fundraiser

Jeff Bray's avatar

Jeff Bray

Forrester Tech Tide for Detection and Response: Is 2019 the Year of Convergence?

Threat Research

Forrester Tech Tide for Detection and Response: Is 2019 the Year of Convergence?

Eric Sun's avatar

Eric Sun

Utilize File Integrity Monitoring to Address Critical Compliance Needs

Detection and Response

Utilize File Integrity Monitoring to Address Critical Compliance Needs

Alex Teng's avatar

Alex Teng

Patch Tuesday - March 2019

Exposure Management

Patch Tuesday - March 2019

Greg Wiseman's avatar

Greg Wiseman

R7-2019-01: CircuitWerkes Sicon-8 Client-Side Authentication Read-Only Bypass (CVE-2019-5616)

Vulnerabilities and Exploits

R7-2019-01: CircuitWerkes Sicon-8 Client-Side Authentication Read-Only Bypass (CVE-2019-5616)

Tod Beardsley's avatar

Tod Beardsley

Rapid7 Introduces Industry Cyber-Exposure Report: ASX 200

Threat Research

Rapid7 Introduces Industry Cyber-Exposure Report: ASX 200

boB Rudis's avatar

boB Rudis