The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
3708 Results

Threat Research
When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise
Anna Širokova

Culture
Rapid7 Partner Academy: Driving Impact with Gold Stevie Award-Winning Partner Services Certifications
Rapid7

Exposure Management
Patch Tuesday - May 2026
Adam Barnett
Security Operations
How Rapid7 is bringing Cyber GRC closer to security operations
Sabeen Malik

Industry Trends
Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit
Emma Burdett

Products and Tools
Metasploit Wrap-Up 05/08/2026
Alan David Foster

Detection and Response
Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code
Zachary Zeid, James Gallahan

Artificial Intelligence
Rapid7 and OpenAI: Helping Defenders Move at Machine Speed
Wade Woolwine

Exposure Management
Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale
James Davis

Vulnerabilities and Exploits
Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)
Jonah Burgess

Threat Research
Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware
Alexandra Blia, Ivan Feigl

Industry Trends
A Walkthrough of the 2026 Global Cybersecurity Summit Agenda
Emma Burdett

Products and Tools
Metasploit Wrap-Up 05/01/2026
Christopher Granleese

Industry Trends
Five Things we Took Away from Gartner SRM Sydney 2026
Rapid7

Vulnerabilities and Exploits
CVE-2026-41940: cPanel & WHM Authentication Bypass
Rapid7

Industry Trends
Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect
Craig Adams

Industry Trends
Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit
Emma Burdett
Detection and Response
MDR Selection is a Partnership Decision
Alan Simpson

Products and Tools
Metasploit Wrap-Up 04/25/2026
Spencer McIntyre

Industry Trends
3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM
Emma Burdett

Artificial Intelligence
AI is Changing Vulnerability Discovery and your Software Supply Chain Strategy has to Change with it
Wade Woolwine