The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Iran’s Cyber Playbook in the Escalating Regional Conflict

Threat Research

Iran’s Cyber Playbook in the Escalating Regional Conflict

Rapid7 Labs's avatar

Rapid7 Labs

Protect What Matters Most: Aligning Sensitive Data with Exposure Risk

Exposure Management

Protect What Matters Most: Aligning Sensitive Data with Exposure Risk

Michael Chroney's avatar

Michael Chroney

Patch Tuesday - March 2026

Exposure Management

Patch Tuesday - March 2026

Adam Barnett's avatar

Adam Barnett

Purple Teaming in 2026: From Assumed Protection to Measurable Resilience

Security Operations

Purple Teaming in 2026: From Assumed Protection to Measurable Resilience

Aaron Herndon's avatar

Aaron Herndon

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Threat Research

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Milan Spinka's avatar

Milan Spinka

Accelerate Attack Surface Discovery with new AI-Powered Connectors

Products and Tools

Accelerate Attack Surface Discovery with new AI-Powered Connectors

Ed Montgomery's avatar

Ed Montgomery

Metasploit Wrap-Up 03/06/2026

Products and Tools

Metasploit Wrap-Up 03/06/2026

Martin Sutovsky's avatar

Martin Sutovsky

From Code to Runtime: The Critical Role of DAST in Application Security

Cloud and Devops Security

From Code to Runtime: The Critical Role of DAST in Application Security

Xavia Hennessy's avatar

Xavia Hennessy

Rapid7 and Our Global Partners Are Elevating Security Together

Culture

Rapid7 and Our Global Partners Are Elevating Security Together

Rapid7's avatar

Rapid7

Claude Code Security and the AI Market Reaction: What Security Leaders should Actually Focus on

Artificial Intelligence

Claude Code Security and the AI Market Reaction: What Security Leaders should Actually Focus on

Laura Ellis's avatar

Laura Ellis

Save the Date: Rapid7’s 2026 Global Cybersecurity Summit | May 12–13

Industry Trends

Save the Date: Rapid7’s 2026 Global Cybersecurity Summit | May 12–13

Rapid7's avatar

Rapid7

Metasploit Wrap-Up 02/27/2026

Products and Tools

Metasploit Wrap-Up 02/27/2026

Jacquie Harris's avatar

Jacquie Harris

Before the Breach: When digital footprints become a strategic cyber risk

Threat Research

Before the Breach: When digital footprints become a strategic cyber risk

Jeremy Makowski's avatar

Jeremy Makowski

Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127)

Vulnerabilities and Exploits

Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127)

Rapid7 Labs's avatar

Rapid7 Labs

Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare

Threat Research

Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare

Rapid7's avatar

Rapid7

The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground

Threat Research

The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground

Alexandra Blia's avatar
Efi Sherman's avatar

Alexandra Blia, Efi Sherman

Multi-Tenant API Access: Centralize, Scale, and Secure Your Operations

Products and Tools

Multi-Tenant API Access: Centralize, Scale, and Secure Your Operations

Niall Curry's avatar

Niall Curry

New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed

Threat Research

New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed

Rapid7's avatar

Rapid7

Alert Fatigue Isn’t Going Away. Here’s How Modern SOCs Are Fighting Back

Detection and Response

Alert Fatigue Isn’t Going Away. Here’s How Modern SOCs Are Fighting Back

Rapid7's avatar

Rapid7

Metasploit Wrap-Up 02/20/2026

Products and Tools

Metasploit Wrap-Up 02/20/2026

Diego Ledda's avatar

Diego Ledda

Hacktivism and the Winter Olympics 2026: What We’re Seeing and What it Signals

Industry Trends

Hacktivism and the Winter Olympics 2026: What We’re Seeing and What it Signals

Emma Burdett's avatar

Emma Burdett