The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrap-Up 03/13/2026

Products and Tools

Metasploit Wrap-Up 03/13/2026

Dean Welch's avatar

Dean Welch

Introducing Hacktics and Telemetry, a Podcast from Rapid7 Labs

Threat Research

Introducing Hacktics and Telemetry, a Podcast from Rapid7 Labs

Douglas McKee's avatar

Douglas McKee

The Face of Penetration Testing is Changing: Announcing Metasploit Pro 5.0.0

Products and Tools

The Face of Penetration Testing is Changing: Announcing Metasploit Pro 5.0.0

The Metasploit Team's avatar

The Metasploit Team

Rapid7 Detection Coverage for Iran-Linked Cyber Activity

Threat Research

Rapid7 Detection Coverage for Iran-Linked Cyber Activity

Rapid7 Labs's avatar

Rapid7 Labs

Iran’s Cyber Playbook in the Escalating Regional Conflict

Threat Research

Iran’s Cyber Playbook in the Escalating Regional Conflict

Rapid7 Labs's avatar

Rapid7 Labs

Protect What Matters Most: Aligning Sensitive Data with Exposure Risk

Exposure Management

Protect What Matters Most: Aligning Sensitive Data with Exposure Risk

Michael Chroney's avatar

Michael Chroney

Patch Tuesday - March 2026

Exposure Management

Patch Tuesday - March 2026

Adam Barnett's avatar

Adam Barnett

Purple Teaming in 2026: From Assumed Protection to Measurable Resilience

Security Operations

Purple Teaming in 2026: From Assumed Protection to Measurable Resilience

Aaron Herndon's avatar

Aaron Herndon

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Threat Research

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Milan Spinka's avatar

Milan Spinka

Accelerate Attack Surface Discovery with new AI-Powered Connectors

Products and Tools

Accelerate Attack Surface Discovery with new AI-Powered Connectors

Ed Montgomery's avatar

Ed Montgomery

Metasploit Wrap-Up 03/06/2026

Products and Tools

Metasploit Wrap-Up 03/06/2026

Martin Sutovsky's avatar

Martin Sutovsky

From Code to Runtime: The Critical Role of DAST in Application Security

Cloud and Devops Security

From Code to Runtime: The Critical Role of DAST in Application Security

Xavia Hennessy's avatar

Xavia Hennessy

Rapid7 and Our Global Partners Are Elevating Security Together

Culture

Rapid7 and Our Global Partners Are Elevating Security Together

Rapid7's avatar

Rapid7

Claude Code Security and the AI Market Reaction: What Security Leaders should Actually Focus on

Artificial Intelligence

Claude Code Security and the AI Market Reaction: What Security Leaders should Actually Focus on

Laura Ellis's avatar

Laura Ellis

Save the Date: Rapid7’s 2026 Global Cybersecurity Summit | May 12–13

Industry Trends

Save the Date: Rapid7’s 2026 Global Cybersecurity Summit | May 12–13

Rapid7's avatar

Rapid7

Metasploit Wrap-Up 02/27/2026

Products and Tools

Metasploit Wrap-Up 02/27/2026

Jacquie Harris's avatar

Jacquie Harris

Before the Breach: When digital footprints become a strategic cyber risk

Threat Research

Before the Breach: When digital footprints become a strategic cyber risk

Jeremy Makowski's avatar

Jeremy Makowski

Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127)

Vulnerabilities and Exploits

Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127)

Rapid7 Labs's avatar

Rapid7 Labs

Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare

Threat Research

Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare

Rapid7's avatar

Rapid7

The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground

Threat Research

The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground

Alexandra Blia's avatar
Efi Sherman's avatar

Alexandra Blia, Efi Sherman

Multi-Tenant API Access: Centralize, Scale, and Secure Your Operations

Products and Tools

Multi-Tenant API Access: Centralize, Scale, and Secure Your Operations

Niall Curry's avatar

Niall Curry