Rapid7 Research

Building a safer world through open sources that go beyond code

Our Philosophy

We believe security is the responsibility of all technology users, manufacturers, and intermediaries and that collaboration is the only way to achieve long-term change. That’s why we’re committed to openly sharing security information, helping our peers to learn, grow, and develop new capabilities, and supporting each other in raising and addressing issues that affect the cybersecurity community.

Project Sonar

Project Sonar is a security research project by Rapid7 that conducts internet-wide scans across different services and protocols to gain insight into global exposure to common vulnerabilities. Like our vulnerability disclosures and exploits, we publish our data for free to encourage scientists, engineers, and anyone else interested in the nature and form of the internet to make their own discoveries.

Learn More

Project Heisenberg

The Heisenberg Cloud is a collection of low-interaction honeypots distributed both geographically and across IP space. The honeypots offer the front end of various services to learn what other scanners are up to (usually no good), and to conduct "passive scanning" to help enhance our understanding of attacker methods.

Learn More

The National Exposure Index

The National Exposure Index is a study conducted annually to better understand the nature of internet exposure—services that either do not offer modern cryptographic protection, or are otherwise unsuitable to offer on the increasingly hostile internet—and how those exposure levels look around the globe. How does your country’s security posture stack up?

Learn More

Quarterly Threat Reports

In our quarterly threat reports, we leverage data from the Rapid7 Insight platform, Managed Detection and Response engagements, Project Sonar, and Project Heisenberg to dive into notable security events, determine key takeaways, and provide helpful information for companies continuing to build out their security programs.

Learn More

Under the Hoodie

In “Under the Hoodie, 2018: Lessons From a Season of Penetration Testing,” we shed light on the “dark art” of penetration testing by revealing not just the processes, techniques, and tools that go into it, but also the real-world experiences of our engineers and investigators gathered over thousands of pen tests.

Learn More
Latest Research
View More Research
Introducing Metasploit’s First Evasion Modules
Rapid7 | Oct 09, 2018
Since early 2018, Rapid7’s Metasploit team has been researching techniques to evade common antivirus products and integrating this knowledge into Metasploit so the broader security community can anticipate and mitigate these techniques. As a culmination of this research, we’ve created a new evasion module...
Read More
This One Time on a Pen Test, Part 5: From Physical Security Weakness to Strength
Steve Laura | Oct 02, 2018
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This is the fifth and final post in our five-part series featuring testimonials of what goes on beneath the hoodie. For more insights, check out our report, “Under the Hoodie...
Read More
Password Tips from a Pen Tester: Are 12-Character Passwords Really Stronger, or Just a Dime a Dozen?
Patrick Laverty | Sep 26, 2018
In previous posts, we’ve looked at the the most common passwords people use in a company environment, default passwords set for new employees, and password patterns. These password trends are uncovered by the many penetration testing service engagements we perform. In this blog, we’ll take a deeper dive...
Read More
Impact Across Industries
Rapid7 researchers constantly work to uncover unknowns as far as technology reaches.
Consumer Technology
It’s hard to imagine our lives without tech glued to our hands. Reality is, security risks are present in even the most unassuming, commonplace devices. Over the years, our researchers have discovered and made public several critical vulnerabilities capable of compromising your personal data and safety in everything from printers, baby monitors, vehicles, and even children’s toys.
Business Technology
It’s no big secret that security has far-reaching impacts on a business—including on its bottom line. The work of our researchers has helped global organizations secure their internal processes, as well as the safety of the customers who rely on them; these improvements can be seen in medical devices, healthcare software, broadcasting equipment, corporate networks, and more.
Public Infrastructure
While most of us don’t spend our days thinking about critical infrastructure, it’s core to the functioning of our world as we know it. Therefore, as the need to innovate it grows, so does our need to secure it. Given our collective dependency on infrastructure, our researchers make it a priority to investigate how to secure emerging tech like smart sensors, while our Public Policy efforts aim to help governments adopt these innovations securely.
The Minds Behind the Research
Meet the Full Team
Tas Giakouminakis
Tas Giakouminakis
Bob Rudis
Bob Rudis
Derek Abdine
Derek Abdine
Tod Beardsley
Tod Beardsley

Where Research Meets the Roadmap

Explore how Rapid7’s unparalleled understanding of attackers makes our products more powerful.

  • Threat feed dashboard informed by Project Heisenberg honeypots in InsightVM
  • Attacker Based Analytics sourced from Projects Sonar and Heisenberg and threat intelligence in InsightIDR
  • Accelerated discovery and coverage of zero-days and other low-notice exploits in InsightVM
  • Discovery of internet-facing assets in InsightVM using integration with Project Sonar
  • Identification of weak or distrusted certs using research on SSL certificate ecosystem
View All Products

Want to dive deeper into our research data?