The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrap Up 05/22/2026

Products and Tools

Metasploit Wrap Up 05/22/2026

Martin Sutovsky's avatar

Martin Sutovsky

Q1 2026 Threat Landscape Report: Zero-clicks, geopolitical tensions, and some wins for law enforcement

Threat Research

Q1 2026 Threat Landscape Report: Zero-clicks, geopolitical tensions, and some wins for law enforcement

Rapid7 Labs's avatar

Rapid7 Labs

Operationalizing CTEM Faster: Build Surface Command Dashboards in Minutes

Exposure Management

Operationalizing CTEM Faster: Build Surface Command Dashboards in Minutes

Ed Montgomery's avatar

Ed Montgomery

Rapid7’s 2026 Global Cybersecurity Summit: Key Takeaways for Security Leaders

Industry Trends

Rapid7’s 2026 Global Cybersecurity Summit: Key Takeaways for Security Leaders

Emma Burdett's avatar

Emma Burdett

Metasploit Wrap-Up 05/15/2026

Products and Tools

Metasploit Wrap-Up 05/15/2026

Martin Sutovsky's avatar

Martin Sutovsky

CVE-2026-0265: Authentication Bypass in Palo Alto Networks PAN-OS

Vulnerabilities and Exploits

CVE-2026-0265: Authentication Bypass in Palo Alto Networks PAN-OS

Rapid7's avatar

Rapid7

CVE-2026-20182: Critical authentication bypass in Cisco Catalyst SD-WAN Controller (FIXED)

Vulnerabilities and Exploits

CVE-2026-20182: Critical authentication bypass in Cisco Catalyst SD-WAN Controller (FIXED)

Jonah Burgess's avatar
Stephen Fewer's avatar

Jonah Burgess, Stephen Fewer

The Dark Side of Efficiency: When Network Controllers Become "God Mode" for Attackers

Vulnerabilities and Exploits

The Dark Side of Efficiency: When Network Controllers Become "God Mode" for Attackers

Douglas McKee, Director, Vulnerability Intelligence's avatar

Douglas McKee, Director, Vulnerability Intelligence

When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise

Threat Research

When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise

Anna Širokova's avatar

Anna Širokova

Rapid7 Partner Academy: Driving Impact with Gold Stevie Award-Winning Partner Services Certifications

Culture

Rapid7 Partner Academy: Driving Impact with Gold Stevie Award-Winning Partner Services Certifications

Rapid7's avatar

Rapid7

Patch Tuesday - May 2026

Exposure Management

Patch Tuesday - May 2026

Adam Barnett's avatar

Adam Barnett

How Rapid7 is bringing Cyber GRC closer to security operations

Security Operations

How Rapid7 is bringing Cyber GRC closer to security operations

Sabeen Malik's avatar

Sabeen Malik

Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit

Industry Trends

Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit

Emma Burdett's avatar

Emma Burdett

Metasploit Wrap-Up 05/08/2026

Products and Tools

Metasploit Wrap-Up 05/08/2026

Alan David Foster's avatar

Alan David Foster

Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code

Detection and Response

Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code

Zachary Zeid's avatar
James Gallahan's avatar

Zachary Zeid, James Gallahan

Rapid7 and OpenAI: Helping Defenders Move at Machine Speed

Artificial Intelligence

Rapid7 and OpenAI: Helping Defenders Move at Machine Speed

Wade Woolwine's avatar

Wade Woolwine

Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale

Exposure Management

Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale

James Davis's avatar

James Davis

Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)

Vulnerabilities and Exploits

Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)

Jonah Burgess's avatar

Jonah Burgess

Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware

Threat Research

Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware

Alexandra Blia's avatar
Ivan Feigl's avatar

Alexandra Blia, Ivan Feigl

A Walkthrough of the 2026 Global Cybersecurity Summit Agenda

Industry Trends

A Walkthrough of the 2026 Global Cybersecurity Summit Agenda

Emma Burdett's avatar

Emma Burdett

Metasploit Wrap-Up 05/01/2026

Products and Tools

Metasploit Wrap-Up 05/01/2026

Christopher Granleese's avatar

Christopher Granleese