The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
3640 Results

Cloud and Devops Security
From Code to Runtime: The Critical Role of DAST in Application Security
Xavia Hennessy

Culture
Rapid7 and Our Global Partners Are Elevating Security Together
Rapid7

Artificial Intelligence
Claude Code Security and the AI Market Reaction: What Security Leaders should Actually Focus on
Laura Ellis

Industry Trends
Save the Date: Rapid7’s 2026 Global Cybersecurity Summit | May 12–13
Rapid7

Products and Tools
Metasploit Wrap-Up 02/27/2026
Jacquie Harris

Threat Research
Before the Breach: When digital footprints become a strategic cyber risk
Jeremy Makowski

Vulnerabilities and Exploits
Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127)
Rapid7 Labs

Threat Research
Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare
Rapid7
Threat Research
The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground
Alexandra Blia, Efi Sherman

Products and Tools
Multi-Tenant API Access: Centralize, Scale, and Secure Your Operations
Niall Curry

Threat Research
New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed
Rapid7

Detection and Response
Alert Fatigue Isn’t Going Away. Here’s How Modern SOCs Are Fighting Back
Rapid7

Products and Tools
Metasploit Wrap-Up 02/20/2026
Diego Ledda
Industry Trends
Hacktivism and the Winter Olympics 2026: What We’re Seeing and What it Signals
Emma Burdett

Vulnerabilities and Exploits
The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP
Douglas McKee

Vulnerabilities and Exploits
CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)
Stephen Fewer

Cloud and Devops Security
Building the Future of Cloud Security: Rapid7 Recognized in Cloud Native Application Protection, Q1 2026
Rapid7

Products and Tools
Metasploit Wrap-Up 02/13/2026
Christopher Granleese
Threat Research
Carding-as-a-Service: The Underground Market of Stolen Cards
Alexandra Blia, Maor Weinberger +1

Exposure Management
Patch Tuesday - February 2026
Adam Barnett

Threat Research
Measuring AI Security: Separating Signal from Panic
Christiaan Beek