All Posts

3 min AWS

Rapid7 Partners with AWS Security Hub for Deeper Vulnerability Reporting

Last month, we were thrilled to announce our integration with AWS Security Hub at AWS re:Invent.

7 min InsightIDR

Windows Event Forwarding: The Best Thing You’ve Never Heard Of

This blog post will discuss how to get logs into your SIEM and create custom alerts to detect certain behaviors in those logs.

2 min Research

Charting the Forthcoming PHPocalypse in 2019

This experiment began when Josh Frantz remarked that he would be curious about the potential exposure from the just-reached EOL date for PHP Version 7.0 and the forthcoming EOL date for PHP 5.6.

2 min Metasploit Weekly Wrapup

Metasploit Wrapup 12/14/18

Backups that Cause Problems hypn0s contributed a module that exploits Snap Creek’s Duplicator plugin for WordPress. Duplicator is a plugin that eases the backup and migration of WordPress installations. For versions 1.2.40 and below, Duplicator leaves behind a number of sensitive files, including one that gives access to controlling the WordPress restoration process. Sending a POST request to the now accessib

4 min AWS

Securing Buckets with Amazon S3 Block Public Access

Amazon Web Services recently introduced a new security enhancement to its cloud storage service: Amazon S3 Block Public Access.

2 min Metasploit

Metasploit Wrapup 12/7/18

If you are tired of all the snake memes and images we pushed out as we stood up support for python external modules over the last year or so, I have terrific news for you!

3 min Application Security

Single-Page Applications: The Journey So Far

While modern web application technology has made apps more useful, it's also made them harder to secure.

4 min AWS

Seeing Security Scale: Rapid7’s Recap of AWS re:Invent 2018

In this post, I will detail my time at AWS re:Invent and provide observations about how security plays a role in our cloud journey.

5 min InsightVM

Did You Remediate That? New InsightVM Executive Report Provides Key Details on Team Progress

We have developed the InsightVM Executive Report so that companies can easily report on month-over-month trends in their vulnerability management programs.

2 min Metasploit

Congrats to the 2018 Metasploit Community CTF Winners

After three days of fierce competition, we have the winners of this year's Metasploit community CTF . We've included some high-level stats from the game below; check out the scoreboard. If you played the CTF this weekend and want to let the Metasploit team know which challenges you found exhilarating, interesting, or infuriating (in a good way, of course). Congratulations to everyone who teamed up with

4 min Metasploit Weekly Wrapup

Metasploit Wrapup 11/30/18

Why can't I hold all these Pull Requests? It has been a busy month here in Metasploit-land, with the holidays, the holiday community contributions, and our community CTF . It doesn't help that the last few months have seen our open pull request count keep climbing as well, reaching over 90 at times. Our fearless leader, busterb , decided to take on the challenge and landed over 20 PRs by himself in the last tw

4 min Automation and Orchestration

Automation: The Ultimate Enabler for Threat Detection and Response

In our recent webcast series, we explain how companies can accelerate across their entire threat detection and response lifecycle by leveraging automation.

3 min Cloud Security

Deploying Kubernetes Across Multiple Clouds

Kubernetes is essentially a container orchestration platform. It is not a container runtime (software that executes containers and manages container images on a node), meaning it doesn’t replace Docker.

5 min Threat Intel

How Retailers Can Protect Against Magecart This Black Friday and Holiday Season

Online credit card-skimming malware Magecart is now a looming threat to nearly every retailer this Black Friday and throughout the rest of the holiday season (and beyond).

7 min Log Management

Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options

In this final installment of our Log Search series, we’ll look at some simple regular expressions that will greatly expand your Log Search options.