The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Why a 17-Year Veteran Pen Tester Took the OSCP

Exposure Management

Why a 17-Year Veteran Pen Tester Took the OSCP

Trevor O'Donnal's avatar

Trevor O'Donnal

Metasploit Wrapup 1/25/19

Exposure Management

Metasploit Wrapup 1/25/19

Wei Chen's avatar

Wei Chen

PHP Extension and Application Repository (PEAR) Compromise: What You Need to Know

Vulnerabilities and Exploits

PHP Extension and Application Repository (PEAR) Compromise: What You Need to Know

boB Rudis's avatar

boB Rudis

How Rapid7’s Orchestration and Automation Solution Boosted a Higher Education Security Team’s Effectiveness

Industry Trends

How Rapid7’s Orchestration and Automation Solution Boosted a Higher Education Security Team’s Effectiveness

Rapid7's avatar

Rapid7

Metasploit Wrapup 1/18/19

Exposure Management

Metasploit Wrapup 1/18/19

Jeffrey Martin's avatar

Jeffrey Martin

Rapid7 Included in 2019 Bloomberg Gender-Equality Index for Commitment to Diversity

Industry Trends

Rapid7 Included in 2019 Bloomberg Gender-Equality Index for Commitment to Diversity

Christina Luconi's avatar

Christina Luconi

What WannaCry Taught Me About the Benefits of Agents in VM Programs

Detection and Response

What WannaCry Taught Me About the Benefits of Agents in VM Programs

Steven Campbell's avatar

Steven Campbell

How AWS and InsightVM Can Help You Securely Move to the Cloud

Products and Tools

How AWS and InsightVM Can Help You Securely Move to the Cloud

Martin Nielsen's avatar

Martin Nielsen

Metasploit Wrap-Up 1/12/19

Products and Tools

Metasploit Wrap-Up 1/12/19

Jacob Robles's avatar

Jacob Robles

Metasploit Framework 5.0 Released!

Products and Tools

Metasploit Framework 5.0 Released!

Brent Cook's avatar

Brent Cook

Did You Remediate That? Take Control of Risk by Knowing Your Top 25 Vulnerabilities

Exposure Management

Did You Remediate That? Take Control of Risk by Knowing Your Top 25 Vulnerabilities

Justin Buchanan's avatar

Justin Buchanan

What You Can Learn from Our Successful Simulated Phishing Attack of 45 CEOs

Detection and Response

What You Can Learn from Our Successful Simulated Phishing Attack of 45 CEOs

Leo Varela's avatar

Leo Varela

Metasploit Wrap-Up 1/4/19

Products and Tools

Metasploit Wrap-Up 1/4/19

Erin Bleiweiss's avatar

Erin Bleiweiss

Happy HaXmas! Year-End Internet Scanning Observations

Threat Research

Happy HaXmas! Year-End Internet Scanning Observations

Jon Hart's avatar

Jon Hart

Santa's ELFs: Running Linux Executables Without execve

Exposure Management

Santa's ELFs: Running Linux Executables Without execve

Adam Cammack's avatar

Adam Cammack

The Ghost of Exploits Past: A Deep Dive into the Morris Worm

Threat Research

The Ghost of Exploits Past: A Deep Dive into the Morris Worm

William Vu's avatar

William Vu

HaXmas Review: 12 Patch Tuesdays a-Patching

Detection and Response

HaXmas Review: 12 Patch Tuesdays a-Patching

Greg Wiseman's avatar

Greg Wiseman

The Layer 8(th) Day of Christmas: Rapid7 Pen Testers Reveal Social Engineering Insights at Recent Conference

Exposure Management

The Layer 8(th) Day of Christmas: Rapid7 Pen Testers Reveal Social Engineering Insights at Recent Conference

Patrick Laverty's avatar

Patrick Laverty

Advice for the Lazy Family Sysadmin

Exposure Management

Advice for the Lazy Family Sysadmin

Brent Cook's avatar

Brent Cook

Once a Haxer, Always a Haxor

Threat Research

Once a Haxer, Always a Haxor

Deral Heiland's avatar

Deral Heiland

The New Shiny: Memorable Metasploit Moments of 2018

Products and Tools

The New Shiny: Memorable Metasploit Moments of 2018

Caitlin Condon's avatar

Caitlin Condon