The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

PACT 2026: A Stronger, Simpler, More Profitable Path for Rapid7 Partners

Culture

PACT 2026: A Stronger, Simpler, More Profitable Path for Rapid7 Partners

Kelly Hiscoe's avatar

Kelly Hiscoe

Rapid7 Guidance on Observed Microsoft Teams Phishing Campaigns

Detection and Response

Rapid7 Guidance on Observed Microsoft Teams Phishing Campaigns

Brett Deroche's avatar

Brett Deroche

From Threat Detection to Response: What to Expect from Our MDR Sessions

Industry Trends

From Threat Detection to Response: What to Expect from Our MDR Sessions

Emma Burdett's avatar

Emma Burdett

Metasploit Wrap-Up 03/13/2026

Products and Tools

Metasploit Wrap-Up 03/13/2026

Dean Welch's avatar

Dean Welch

Introducing Hacktics and Telemetry, a Podcast from Rapid7 Labs

Threat Research

Introducing Hacktics and Telemetry, a Podcast from Rapid7 Labs

Douglas McKee's avatar

Douglas McKee

The Face of Penetration Testing is Changing: Announcing Metasploit Pro 5.0.0

Products and Tools

The Face of Penetration Testing is Changing: Announcing Metasploit Pro 5.0.0

The Metasploit Team's avatar

The Metasploit Team

Rapid7 Detection Coverage for Iran-Linked Cyber Activity

Threat Research

Rapid7 Detection Coverage for Iran-Linked Cyber Activity

Rapid7 Labs's avatar

Rapid7 Labs

Iran’s Cyber Playbook in the Escalating Regional Conflict

Threat Research

Iran’s Cyber Playbook in the Escalating Regional Conflict

Rapid7 Labs's avatar

Rapid7 Labs

Protect What Matters Most: Aligning Sensitive Data with Exposure Risk

Exposure Management

Protect What Matters Most: Aligning Sensitive Data with Exposure Risk

Michael Chroney's avatar

Michael Chroney

Patch Tuesday - March 2026

Exposure Management

Patch Tuesday - March 2026

Adam Barnett's avatar

Adam Barnett

Purple Teaming in 2026: From Assumed Protection to Measurable Resilience

Security Operations

Purple Teaming in 2026: From Assumed Protection to Measurable Resilience

Aaron Herndon's avatar

Aaron Herndon

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Threat Research

When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation

Milan Spinka's avatar

Milan Spinka

Accelerate Attack Surface Discovery with new AI-Powered Connectors

Products and Tools

Accelerate Attack Surface Discovery with new AI-Powered Connectors

Ed Montgomery's avatar

Ed Montgomery

Metasploit Wrap-Up 03/06/2026

Products and Tools

Metasploit Wrap-Up 03/06/2026

Martin Sutovsky's avatar

Martin Sutovsky

From Code to Runtime: The Critical Role of DAST in Application Security

Cloud and Devops Security

From Code to Runtime: The Critical Role of DAST in Application Security

Xavia Hennessy's avatar

Xavia Hennessy

Rapid7 and Our Global Partners Are Elevating Security Together

Culture

Rapid7 and Our Global Partners Are Elevating Security Together

Rapid7's avatar

Rapid7

Claude Code Security and the AI Market Reaction: What Security Leaders should Actually Focus on

Artificial Intelligence

Claude Code Security and the AI Market Reaction: What Security Leaders should Actually Focus on

Laura Ellis's avatar

Laura Ellis

Save the Date: Rapid7’s 2026 Global Cybersecurity Summit | May 12–13

Industry Trends

Save the Date: Rapid7’s 2026 Global Cybersecurity Summit | May 12–13

Rapid7's avatar

Rapid7

Metasploit Wrap-Up 02/27/2026

Products and Tools

Metasploit Wrap-Up 02/27/2026

Jacquie Harris's avatar

Jacquie Harris

Before the Breach: When digital footprints become a strategic cyber risk

Threat Research

Before the Breach: When digital footprints become a strategic cyber risk

Jeremy Makowski's avatar

Jeremy Makowski

Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127)

Vulnerabilities and Exploits

Critical Cisco Catalyst Vulnerability Exploited in the wild (CVE-2026-20127)

Rapid7 Labs's avatar

Rapid7 Labs