The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrapup 11/30/18

Products and Tools

Metasploit Wrapup 11/30/18

Adam Cammack's avatar

Adam Cammack

Automation: The Ultimate Enabler for Threat Detection and Response

Detection and Response

Automation: The Ultimate Enabler for Threat Detection and Response

Eric Sun's avatar

Eric Sun

Deploying Kubernetes Across Multiple Clouds

Cloud and Devops Security

Deploying Kubernetes Across Multiple Clouds

David Mundy's avatar

David Mundy

How Retailers Can Protect Against Magecart This Black Friday and Holiday Season

Threat Research

How Retailers Can Protect Against Magecart This Black Friday and Holiday Season

boB Rudis's avatar

boB Rudis

Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options

Products and Tools

Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options

Teresa Copple's avatar

Teresa Copple

Metasploit Wrapup 11/16/18

Products and Tools

Metasploit Wrapup 11/16/18

Matthew Kienow's avatar

Matthew Kienow

5 Tips For Monitoring Network Traffic on Your Network

Products and Tools

5 Tips For Monitoring Network Traffic on Your Network

Rapid7's avatar

Rapid7

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Detection and Response

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Christie Ott's avatar

Christie Ott

Rolling with Your Logs, Part 2: Advanced Mode Searches

Detection and Response

Rolling with Your Logs, Part 2: Advanced Mode Searches

Teresa Copple's avatar

Teresa Copple

Automate Insight Agent Deployment in AWS

Cloud and Devops Security

Automate Insight Agent Deployment in AWS

Ben Glass's avatar

Ben Glass

Metasploit Wrapup 11/9/18

Products and Tools

Metasploit Wrapup 11/9/18

Pearce Barry's avatar

Pearce Barry

Top 5 Cybersecurity Threats Healthcare Organizations Face

Industry Trends

Top 5 Cybersecurity Threats Healthcare Organizations Face

Kristina LeBlanc's avatar

Kristina LeBlanc

Rolling with Your Logs, Part 1: Your Guide to Log Search in InsightIDR

Detection and Response

Rolling with Your Logs, Part 1: Your Guide to Log Search in InsightIDR

Teresa Copple's avatar

Teresa Copple

Announcing the 2018 Metasploit Community CTF

Products and Tools

Announcing the 2018 Metasploit Community CTF

Caitlin Condon's avatar

Caitlin Condon

Metasploit Wrapup: 11/2/18

Products and Tools

Metasploit Wrapup: 11/2/18

Aaron Soto's avatar

Aaron Soto

Expanded Protections for Security Researchers Under DMCA Sec. 1201

Industry Trends

Expanded Protections for Security Researchers Under DMCA Sec. 1201

Harley Geiger's avatar

Harley Geiger

Three Expensive Security Operations Costs and How to Minimize Them with SOAR

Security Operations

Three Expensive Security Operations Costs and How to Minimize Them with SOAR

Christie Ott's avatar

Christie Ott

Prioritizing the Fundamentals of Coordinated Vulnerability Disclosure

Vulnerabilities and Exploits

Prioritizing the Fundamentals of Coordinated Vulnerability Disclosure

Harley Geiger's avatar

Harley Geiger

A Day in the Life of a Rapid7 SOC Analyst

Security Operations

A Day in the Life of a Rapid7 SOC Analyst

Jonathan Beggs's avatar

Jonathan Beggs

Whiteboard Wednesday: Common Vulnerabilities as Personified by Halloween Costumes

Exposure Management

Whiteboard Wednesday: Common Vulnerabilities as Personified by Halloween Costumes

Bri Hand's avatar

Bri Hand

Shoring Up the Defenses Together: 2018Q2 and Q3 Wrap-Up

Vulnerabilities and Exploits

Shoring Up the Defenses Together: 2018Q2 and Q3 Wrap-Up

Sam Huckins's avatar

Sam Huckins