Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.

View Cookie Policy for full details

We've updated Rapid7’s community resources

Hello. We've evolved our community resources to provide a richer experience. Learn more.
Questions? Contact us.


Blogs, How-tos, & Research

Our new blog will still publish the same cutting-edge research, analysis, and commentary you expect from Rapid7.

Explore the Blog

Docs, Help, & Questions

Help content and documents are now curated to let you get the information you need even faster.

Explore Help

Metasploit Wrapup

If you are tired of all the snake memes and images we pushed out as we stood up support for python external modules over the last year or so, I have terrific news for you!…

Single-Page Applications: The Journey So Far

While modern web application technology has made apps more useful, it's also made them harder to secure.…

Seeing Security Scale: Rapid7’s Recap of AWS re:Invent 2018

In this post, I will detail my time at AWS re:Invent and provide observations about how security plays a role in our cloud journey.…

Congrats to the 2018 Metasploit community CTF winners

After three days of fierce competition, we have the winners of this year's Metasploit community CTF. We've included some high-level stats from the game below; check out the scoreboard here. If you played the CTF this weekend and want to let the Metasploit team know…

Metasploit Wrapup

Why can't I hold all these Pull Requests? It has been a busy month here in Metasploit-land, with the holidays, the holiday community contributions, and our community CTF. It doesn't help that the last few months have seen our open pull request count keep climbing…

Automation: The Ultimate Enabler for Threat Detection and Response

In our recent webcast series, we explain how companies can accelerate across their entire threat detection and response lifecycle by leveraging automation.…

How to Turn Remediation into Reality with Automation

When vulnerability management responsibilities are distributed across teams, it results in silos, differing terminology, and a lack of common visibility.…

AWS re:Invent: Challenges to Operationalizing Security When There Are Too Many Cooks in Your Hybrid IT Kitchen

This week, we’re at AWS re:Invent, hoping that in 2019, our IT infrastructures see transformational change in cost, security, and scalability.…

Feel Like Family Tech Support? Tips for Securing Your Loved Ones This Holiday Season

In this post, we offer some specific advice on how you can make some headway on battening down the cyber-hatches of your loved ones’ home networks.…

Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options

In this final installment of our Log Search series, we’ll look at some simple regular expressions that will greatly expand your Log Search options.…

Lessons Learned Firsthand: Securing Corporate Voicemail PINs

On Thursday afternoon, Nov. 15, 2018, Rapid7 learned of a potential security issue with our corporate voicemail system, reported by security researcher Kristian Hermansen.…