The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise

Threat Research

When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise

Anna Širokova's avatar

Anna Širokova

Rapid7 Partner Academy: Driving Impact with Gold Stevie Award-Winning Partner Services Certifications

Culture

Rapid7 Partner Academy: Driving Impact with Gold Stevie Award-Winning Partner Services Certifications

Rapid7's avatar

Rapid7

Patch Tuesday - May 2026

Exposure Management

Patch Tuesday - May 2026

Adam Barnett's avatar

Adam Barnett

How Rapid7 is bringing Cyber GRC closer to security operations

Security Operations

How Rapid7 is bringing Cyber GRC closer to security operations

Sabeen Malik's avatar

Sabeen Malik

Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit

Industry Trends

Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit

Emma Burdett's avatar

Emma Burdett

Metasploit Wrap-Up 05/08/2026

Products and Tools

Metasploit Wrap-Up 05/08/2026

Alan David Foster's avatar

Alan David Foster

Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code

Detection and Response

Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code

Zachary Zeid's avatar
James Gallahan's avatar

Zachary Zeid, James Gallahan

Rapid7 and OpenAI: Helping Defenders Move at Machine Speed

Artificial Intelligence

Rapid7 and OpenAI: Helping Defenders Move at Machine Speed

Wade Woolwine's avatar

Wade Woolwine

Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale

Exposure Management

Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale

James Davis's avatar

James Davis

Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)

Vulnerabilities and Exploits

Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)

Jonah Burgess's avatar

Jonah Burgess

Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware

Threat Research

Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware

Alexandra Blia's avatar
Ivan Feigl's avatar

Alexandra Blia, Ivan Feigl

A Walkthrough of the 2026 Global Cybersecurity Summit Agenda

Industry Trends

A Walkthrough of the 2026 Global Cybersecurity Summit Agenda

Emma Burdett's avatar

Emma Burdett

Metasploit Wrap-Up 05/01/2026

Products and Tools

Metasploit Wrap-Up 05/01/2026

Christopher Granleese's avatar

Christopher Granleese

Five Things we Took Away from Gartner SRM Sydney 2026

Industry Trends

Five Things we Took Away from Gartner SRM Sydney 2026

Rapid7's avatar

Rapid7

CVE-2026-41940: cPanel & WHM Authentication Bypass

Vulnerabilities and Exploits

CVE-2026-41940: cPanel & WHM Authentication Bypass

Rapid7's avatar

Rapid7

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

Industry Trends

Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect

Craig Adams's avatar

Craig Adams

Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit

Industry Trends

Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit

Emma Burdett's avatar

Emma Burdett

MDR Selection is a Partnership Decision

Detection and Response

MDR Selection is a Partnership Decision

Alan Simpson's avatar

Alan Simpson

Metasploit Wrap-Up 04/25/2026

Products and Tools

Metasploit Wrap-Up 04/25/2026

Spencer McIntyre's avatar

Spencer McIntyre

3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM

Industry Trends

3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM

Emma Burdett's avatar

Emma Burdett

AI is Changing Vulnerability Discovery and your Software Supply Chain Strategy has to Change with it

Artificial Intelligence

AI is Changing Vulnerability Discovery and your Software Supply Chain Strategy has to Change with it

Wade Woolwine's avatar

Wade Woolwine