The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrap-Up 05/01/2026

Products and Tools

Metasploit Wrap-Up 05/01/2026

Christopher Granleese's avatar

Christopher Granleese

Five Things we Took Away from Gartner SRM Sydney 2026

Industry Trends

Five Things we Took Away from Gartner SRM Sydney 2026

Rapid7's avatar

Rapid7

CVE-2026-41940: cPanel & WHM Authentication Bypass

Vulnerabilities and Exploits

CVE-2026-41940: cPanel & WHM Authentication Bypass

Rapid7's avatar

Rapid7

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

Industry Trends

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

Craig Adams's avatar

Craig Adams

Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit

Industry Trends

Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit

Emma Burdett's avatar

Emma Burdett

MDR Selection is a Partnership Decision

Detection and Response

MDR Selection is a Partnership Decision

Alan Simpson's avatar

Alan Simpson

Metasploit Wrap-Up 04/25/2026

Products and Tools

Metasploit Wrap-Up 04/25/2026

Spencer McIntyre's avatar

Spencer McIntyre

3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM

Industry Trends

3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM

Emma Burdett's avatar

Emma Burdett

AI is Changing Vulnerability Discovery and your Software Supply Chain Strategy has to Change with it

Artificial Intelligence

AI is Changing Vulnerability Discovery and your Software Supply Chain Strategy has to Change with it

Wade Woolwine's avatar

Wade Woolwine

Kyber Ransomware Double Trouble: Windows and ESXi Attacks Explained

Threat Research

Kyber Ransomware Double Trouble: Windows and ESXi Attacks Explained

Anna Širokova's avatar

Anna Širokova

From Bulk Export to AI-ready Security Workflows: Introducing Rapid7’s Open-Source MCP Server and Agent Skill

Exposure Management

From Bulk Export to AI-ready Security Workflows: Introducing Rapid7’s Open-Source MCP Server and Agent Skill

Michael Chroney's avatar
Ed Montgomery's avatar

Michael Chroney, Ed Montgomery

Project Glasswing and the Next Challenge for Defenders: Turning Faster Discovery into Faster Action

Artificial Intelligence

Project Glasswing and the Next Challenge for Defenders: Turning Faster Discovery into Faster Action

Craig Adams's avatar

Craig Adams

Metasploit Wrap-Up 04/17/2026

Products and Tools

Metasploit Wrap-Up 04/17/2026

Jack Heysel's avatar

Jack Heysel

CVE-2026-33032: Nginx UI Missing MCP Authentication

Vulnerabilities and Exploits

CVE-2026-33032: Nginx UI Missing MCP Authentication

Rapid7's avatar

Rapid7

ClickFix Phishing Campaign Masquerading as a Claude Installer

Vulnerabilities and Exploits

ClickFix Phishing Campaign Masquerading as a Claude Installer

Nicholas Spagnola's avatar

Nicholas Spagnola

A Clearer Path from Prioritized Exposures to Remediation Progress

Exposure Management

A Clearer Path from Prioritized Exposures to Remediation Progress

Michael Chroney's avatar

Michael Chroney

Patch Tuesday - April 2026

Exposure Management

Patch Tuesday - April 2026

Adam Barnett's avatar

Adam Barnett

Your Cloud Detection Strategy in 2026: What to Expect at the Global Cybersecurity Summit

Industry Trends

Your Cloud Detection Strategy in 2026: What to Expect at the Global Cybersecurity Summit

Emma Burdett's avatar

Emma Burdett

Turning Log Lines into Answers: Instant Clarity for SOC Teams

Detection and Response

Turning Log Lines into Answers: Instant Clarity for SOC Teams

Sean O'Brien's avatar

Sean O'Brien

Metasploit Wrap-Up 04/10/2026

Products and Tools

Metasploit Wrap-Up 04/10/2026

Simon Janusz's avatar

Simon Janusz

What Project Glasswing Means for Security Leaders

Artificial Intelligence

What Project Glasswing Means for Security Leaders

Douglas McKee, Director, Vulnerability Intelligence's avatar

Douglas McKee, Director, Vulnerability Intelligence