Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.


View Cookie Policy for full details

We've updated Rapid7’s community resources

Hello. We've evolved our community resources to provide a richer experience. Learn more.
Questions? Contact us.

blog.rapid7.com

Blogs, How-tos, & Research

Our new blog will still publish the same cutting-edge research, analysis, and commentary you expect from Rapid7.

Explore the Blog
help.rapid7.com

Docs, Help, & Questions

Help content and documents are now curated to let you get the information you need even faster.

Explore Help

Self-Isolation, Home Networking, and Open Source: Recog and Rumble

In this blog, we discuss an open source project we run here at Rapid7: Recog and its free network fingerprinting database.…

Shifting Security Conferences to Virtual: The New Face of Events in 2020 and Beyond

John Strand explains how his company created a virtual event in just three days amid the COVID-19 pandemic, and how he teaches others to do the same.…

8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization

Eight practical steps to help you implement key controls into your organization. Get started now!…

Financial resources for small businesses grappling with COVID-19

Congress recently passed the CARES Act to help American businesses during the COVID-19 pandemic. The CARES Act established several assistance programs for small businesses. This post provides an overview of these programs, with links to additional information.…

Phishing for SYSTEM on Microsoft Exchange (CVE-2020-0688)

As of March 24, there were over 350,000 Microsoft Exchange servers exposing a version of the software with a vulnerability.…

4 Common Goals For Vulnerability Risk Management Programs

This post will give you a glimpse into the research to pinpoint under-served and unmet customer needs in the vulnerability risk management space.…

Metasploit Wrap-Up

This week's release includes a local privilege escalation exploit for VMware Fusion through 11.5.3 on OS X, as well as RCE on Apache Solr and DNN cookie deserialization.…

Analyze Security Data Faster with Visual Search in InsightIDR

Learn how InsightIDR, Rapid7’s SIEM tool, uses visualization to provide powerful security data analysis.…

Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities

In this blog, we break down what you need to know about the recent Zoom security issues and its vulnerability remediation process.…

SOC Automation: Accelerate Threat Detection and Response with SIEM and SOAR

We believe that the best solution to industry-wide struggles with threat detection and response is to increase efficiency using SIEM and SOAR together.…

How to Measurably Reduce False Positive Vulnerabilities by Up To 22%

Today, we discuss how to measurably reduce false positive vulnerabilities so you can reallocate your team's time and resources.…

A Chat with Jonathan Cran About Intrigue and Security in the COVID-19 Pandemic

In a recent episode of Rapid7’s podcast, Security Nation, we talked with Jonathan Cran, Head of Research at Kenna Security.…

Working from Home? Wi-Fi Security and Tips and Tricks

I jotted down some Wi-Fi security and management tips for my friends and colleagues who might not have paid much attention to their home networking.…

Metasploit Wrap-Up

Three new modules, including a post module to automate the installation of an embeddable Python interpreter on a target, and a new exploit for Microsoft SharePoint Workflows.…

How to Participate in Our Metasploit Pro Customer Survey

As a Metasploit Pro customer, we want to know what your priorities are, what challenges you’re facing, and how Metasploit Pro addresses those needs.…