The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Understanding Ubiquiti Discovery Service Exposures

Threat Research

Understanding Ubiquiti Discovery Service Exposures

Jon Hart's avatar

Jon Hart

Did You Remediate That? How to Integrate Vulnerability Remediation Projects with Your IT Infrastructure

Exposure Management

Did You Remediate That? How to Integrate Vulnerability Remediation Projects with Your IT Infrastructure

Jesika McEvoy's avatar

Jesika McEvoy

How Security Orchestration & Automation Can Add Immediate Value

Security Operations

How Security Orchestration & Automation Can Add Immediate Value

Christie Ott's avatar

Christie Ott

What Really Happened to the Dark Web Insider Trading Forum KickAss?

Exposure Management

What Really Happened to the Dark Web Insider Trading Forum KickAss?

Orin Mor's avatar

Orin Mor

Cisco RV320/RV325 Router Unauthenticated Configuration Export Vulnerability (CVE-2019-1653): What You Need to Know

Threat Research

Cisco RV320/RV325 Router Unauthenticated Configuration Export Vulnerability (CVE-2019-1653): What You Need to Know

boB Rudis's avatar

boB Rudis

Why a 17-Year Veteran Pen Tester Took the OSCP

Exposure Management

Why a 17-Year Veteran Pen Tester Took the OSCP

Trevor O'Donnal's avatar

Trevor O'Donnal

Metasploit Wrapup 1/25/19

Exposure Management

Metasploit Wrapup 1/25/19

Wei Chen's avatar

Wei Chen

PHP Extension and Application Repository (PEAR) Compromise: What You Need to Know

Vulnerabilities and Exploits

PHP Extension and Application Repository (PEAR) Compromise: What You Need to Know

boB Rudis's avatar

boB Rudis

How Rapid7’s Orchestration and Automation Solution Boosted a Higher Education Security Team’s Effectiveness

Industry Trends

How Rapid7’s Orchestration and Automation Solution Boosted a Higher Education Security Team’s Effectiveness

Rapid7's avatar

Rapid7

Metasploit Wrapup 1/18/19

Exposure Management

Metasploit Wrapup 1/18/19

Jeffrey Martin's avatar

Jeffrey Martin

Rapid7 Included in 2019 Bloomberg Gender-Equality Index for Commitment to Diversity

Industry Trends

Rapid7 Included in 2019 Bloomberg Gender-Equality Index for Commitment to Diversity

Christina Luconi's avatar

Christina Luconi

What WannaCry Taught Me About the Benefits of Agents in VM Programs

Detection and Response

What WannaCry Taught Me About the Benefits of Agents in VM Programs

Steven Campbell's avatar

Steven Campbell

How AWS and InsightVM Can Help You Securely Move to the Cloud

Products and Tools

How AWS and InsightVM Can Help You Securely Move to the Cloud

Martin Nielsen's avatar

Martin Nielsen

Metasploit Wrap-Up 1/12/19

Products and Tools

Metasploit Wrap-Up 1/12/19

Jacob Robles's avatar

Jacob Robles

Metasploit Framework 5.0 Released!

Products and Tools

Metasploit Framework 5.0 Released!

Brent Cook's avatar

Brent Cook

Did You Remediate That? Take Control of Risk by Knowing Your Top 25 Vulnerabilities

Exposure Management

Did You Remediate That? Take Control of Risk by Knowing Your Top 25 Vulnerabilities

Justin Buchanan's avatar

Justin Buchanan

What You Can Learn from Our Successful Simulated Phishing Attack of 45 CEOs

Detection and Response

What You Can Learn from Our Successful Simulated Phishing Attack of 45 CEOs

Leo Varela's avatar

Leo Varela

Metasploit Wrap-Up 1/4/19

Products and Tools

Metasploit Wrap-Up 1/4/19

Erin Bleiweiss's avatar

Erin Bleiweiss

Happy HaXmas! Year-End Internet Scanning Observations

Threat Research

Happy HaXmas! Year-End Internet Scanning Observations

Jon Hart's avatar

Jon Hart

Santa's ELFs: Running Linux Executables Without execve

Exposure Management

Santa's ELFs: Running Linux Executables Without execve

Adam Cammack's avatar

Adam Cammack

The Ghost of Exploits Past: A Deep Dive into the Morris Worm

Threat Research

The Ghost of Exploits Past: A Deep Dive into the Morris Worm

William Vu's avatar

William Vu