The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
3672 Results

Products and Tools
Metasploit Wrap-Up 03/13/2026
Dean Welch

Threat Research
Introducing Hacktics and Telemetry, a Podcast from Rapid7 Labs
Douglas McKee

Products and Tools
The Face of Penetration Testing is Changing: Announcing Metasploit Pro 5.0.0
The Metasploit Team
Threat Research
Rapid7 Detection Coverage for Iran-Linked Cyber Activity
Rapid7 Labs

Threat Research
Iran’s Cyber Playbook in the Escalating Regional Conflict
Rapid7 Labs

Exposure Management
Protect What Matters Most: Aligning Sensitive Data with Exposure Risk
Michael Chroney

Exposure Management
Patch Tuesday - March 2026
Adam Barnett

Security Operations
Purple Teaming in 2026: From Assumed Protection to Measurable Resilience
Aaron Herndon

Threat Research
When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation
Milan Spinka

Products and Tools
Accelerate Attack Surface Discovery with new AI-Powered Connectors
Ed Montgomery

Products and Tools
Metasploit Wrap-Up 03/06/2026
Martin Sutovsky

Cloud and Devops Security
From Code to Runtime: The Critical Role of DAST in Application Security
Xavia Hennessy

Culture
Rapid7 and Our Global Partners Are Elevating Security Together
Rapid7

Artificial Intelligence
Claude Code Security and the AI Market Reaction: What Security Leaders should Actually Focus on
Laura Ellis

Industry Trends
Save the Date: Rapid7’s 2026 Global Cybersecurity Summit | May 12–13
Rapid7

Products and Tools
Metasploit Wrap-Up 02/27/2026
Jacquie Harris

Threat Research
Before the Breach: When digital footprints become a strategic cyber risk
Jeremy Makowski

Vulnerabilities and Exploits
Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127)
Rapid7 Labs

Threat Research
Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare
Rapid7
Threat Research
The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground
Alexandra Blia, Efi Sherman

Products and Tools
Multi-Tenant API Access: Centralize, Scale, and Secure Your Operations
Niall Curry