Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.


View Cookie Policy for full details

Recent Posts

May 2020 Cisco Remote Vulnerabilities Guidance

Cisco has posted patches for 34 vulnerabilities on May 6, 2020, with half a dozen that require your immediate attention.…

Metasploit Wrap-Up

Nine new modules, including three IBM Data Risk Manager exploits, a couple Windows privilege elevation modules, and a .NET deserialization exploit for Veeam ONE Agent. Plus, a new .NET deserialization tool that allows users to generate serialized payloads in the vein of YSoSerial.NET.…

Best Practices for Securing e-Commerce Applications

Learn why e-commerce security is becoming more necessary than ever before, and steps to take to ensure applications are safe from a vulnerability or data breach.…

How to Increase Your Security Team's Visibility Within Your Organization—And What Happens When You Do

In this post, we’ll discuss how you can increase visibility and communication across the organization to improve your team’s reputation and resources.…

Why SOAR Is an Essential Cybersecurity Tool for Financial Services Companies

With an efficient and productive cybersecurity process in mind, let’s take a look at how SOAR helped a financial organization protect its customers.…

Reduce Risk with CyberArk and Rapid7 Integrations

There are a number of out-of-the-box integrations between CyberArk and Rapid7 that can help organizations both reduce risk and ease the burden on operations teams.…

5 Challenges Outsourced Detection and Response Operations Can Help Solve

In this blog, we discuss five challenges that managed detection and response (MDR) operations can help solve.…

Metasploit Wrap-up

Windows Meterpreter payload improvements Community contributor OJ has made improvements to Windows Meterpreter payloads. Specifically reducing complexity around extension building and loading. This change comes with the benefit of removing some fingerprint artifacts, as well reducing the payload size as a side-effect. Note that Windows…

Advocating for Tech Literacy and Transparency: A Discussion with I Am The Cavalry’s Josh Corman and Audra Hatch

In this episode of Security Nation, Josh Corman and Audra Hatch share how to stay ahead of cybercriminals, and how SBoMs can work for everybody.…

Staying Healthy and Secure: How to Promote a Culture of Productivity While Keeping Your Security Posture Intact

In this session of our Remote Work Readiness Series, Rapid7’s own shared their advice for staying healthy and secure in the time of COVID-19.…

Rapid7’s Full Stack Vulnerability Risk Management Portfolio Recognized for Application Security Capabilities

Recently, Rapid7 was the only full stack vulnerability risk management vendor to be recognized for Application Security Testing by an industry-leading third-party research firm.…

Rapid7 Announces Intent to Acquire DivvyCloud

We are thrilled to announce that today we have entered into a definitive agreement to acquire DivvyCloud.…

Risks in Disposing of IoT Embedded Technology

In this blog, Deral Heiland discusses the potential risks in disposing of IoT embedded technology.…

CVE-2020-12271: Sophos XG Firewall Pre-Auth SQL Injection Vulnerability Remediation Guidance and Exposure Overview

On April 22, Sophos received a report documenting a suspicious field value visible in the management interface of an XG Firewall.…

The Healthcare Security Pro's Guide to Ransomware Attacks

In this blog, we discuss the best practices to defend against ransomware attacks in the healthcare industry.…

Never miss a blog

Get the latest stories, expertise, and news about security today.