4 min
Azure
Securing Your Cloud Environments with InsightIDR, Part 1: Microsoft Azure
This post reviews logging considerations for Microsoft Azure environments, and integrations and detections available in Rapid7’s cloud SIEM, InsightIDR.
1 min
Metasploit
Metasploit Development Diaries: Q2 2019
Hey folks, it's towards the end of the second quarter, which means it's high
time for another Metasploit Dev Diary! If you already know what this series is
about, feel free to just click on over here
and read away. If you need more convincing, here's the skinny.
Once a quarter, the indomitable Metasploit
engineering team is going to pull
you, dear reader, behind the cur
2 min
InsightVM
How Rapid7’s AWS Security Hub Integrations Increase Cloud Visibility and Automate Security Operations
As part of our ongoing commitment to support customers using Amazon Web Services (AWS), Rapid7 announces integrations with the AWS Security Hub for vulnerability management and SOAR solutions.
3 min
InsightVM
Rapid7 Releases Cloud Configuration Assessment Capabilities in InsightVM
Rapid7 is pleased to announce that we have released new Cloud Configuration Assessment capabilities in our InsightVM vulnerability management solution.
5 min
Podcast
Great Barrier Grief: How to Break Through Bottlenecks with Automated AppSec
In our brand-new podcast, Security Nation, Zate Berg of Indeed.com explains how he avoided making his team an engineering bottleneck through automated appsec.
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 6/21/19
TLS support and expanded options for the BlueKeep scanner module, two new modules for Cisco Prime Infrastructure, and more.
3 min
InsightVM
Blocking User Access to Vulnerable Assets with CyberArk and InsightVM
With InsightVM's new integration with the CyberArk Privileged Access Security Solution, user access to vulnerable assets can be automatically restricted until the issue is eliminated.
3 min
InsightIDR
Announcing CyberArk and InsightIDR Integration: Connect CyberArk with InsightIDR to Visualize and Investigate Your Privileged Access
To help companies monitor user behavior, secure privileged access, and identify attacks on passwords, we are teaming up with CyberArk.
3 min
Project Sonar
Attack Surface Monitoring with Project Sonar
Attack Surface Monitoring with Project Sonar can help you reduce and monitor your attack surface.
5 min
Metasploit
Metasploit Hackathon Wrap-Up: What We Worked On
As part of the Metasploit project's second hackathon, Metasploit contributors and committers got together to discuss ideas, write some code, and have some fun.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 6/14/19
It’s Summertime, and the Hackin’ is Easy
It is still early in the season, but there’s a whole lot of fixes that are
already shipping. Straight off a week of intellectual synergy from the
world-wide hackathon, we started to fix a lot of things we noticed while we
coded over street tacos and Austin-famous beverages. All told, this week we made
Metasploit more inclusive, transparent, and configurable!
Inclusive
@wvu-r7 has been on a roll trying to make Metasploit play well with others. He
teamed u
3 min
Automation and Orchestration
How to Automate Phishing Investigations and Remediation
Here are four ways security orchestration and automation (SOAR) tools can streamline the phishing investigation process.
18 min
Windows
Heap Overflow Exploitation on Windows 10 Explained
Heap corruption can be a scary topic. In this post, we go through a basic example of a heap overflow on Windows 10.
5 min
Research
Industry Cyber-Exposure Report: FTSE 250+
Today, Rapid7 released our third Industry Cyber-Exposure Report, examining the overall exposure of the companies listed in the FTSE 250 index.
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 6/7/19
Read up on how the recent community hackathon in Austin went, three new modules, and the usual long list of fixes and enhancements.