Patch Tuesday - January 2026

Jan 14 2026

Microsoft is publishing 114 vulnerabilities this January 2026 Patch Tuesday. Today’s menu includes just one vulnerability marked as exploited in the wild, as well as two vulnerabilities where Microsoft is aware of public disclosure. There are no critical remote code execution or elevation of privilege vulnerabilities. So far this month, Microsoft has already provided patches to address one browser vulnerability and around a dozen vulnerabilities in open source products, which are not included in the Patch Tuesday count above.

Windows DWM: exploited-in-the-wild information disclosure

The Windows Desktop Windows Manager (DWM) is a high value target for vulnerability researchers and threat actors, and CVE-2026-20805 is the latest in an occasional series of exploited-in-the-wild zero-day vulnerabilities to have emerged from it. DWM is responsible for drawing everything on the display of a Windows system, which means it offers an enticing combination of privileged access and universal availability, since just about any process might need to display something. In this case, exploitation leads to improper disclosure of an ALPC port section address, which is a section of user mode memory where Windows components coordinate various actions between themselves.

The CVSS v3 score of 5.5 evaluates to medium severity, which wouldn’t typically scream “patch me first”, but Microsoft evaluates CVE-2026-20805 as important on their proprietary severity scale, and information disclosure vulnerabilities by their very nature tend to end up with lower CVSS scores, since there’s no direct impact on integrity or availability. Also, Microsoft information disclosure vulnerabilities very rarely end up marked as exploited in the wild; any that do are very likely to be part of a longer exploit chain. In this case, it’s likely that the improperly disclosed memory address gives an attacker a starting point in the hunt for the in-memory address of the DWM process, sidestepping Address Space Layout Randomization (ASLR), and greatly increasing the chance of developing a stable elevation of privilege exploit for DWM rather than a flakey blue screen of death generator.

Windows Agere modem driver: publicly disclosed elevation of privilege

Back in October 2025, Microsoft removed a specific modem driver ltmdm64.sys from all versions of Windows, after it was implicated in CVE-2025-24052, an exploited-in-the-wild elevation of privilege vulnerability. Today sees another couple of modem drivers removed from Windows for a broadly similar reason: Microsoft is aware of functional exploit code for an elevation of privilege vulnerability in a very similar modem driver, tracked as CVE-2023-31096. That’s not a typo; this vulnerability was originally published via MITRE over two years ago, along with a credible public writeup by the original researcher. Today’s Windows patches remove agrsm64.sys and agrsm.sys. All three modem drivers were originally developed by the same now-defunct third party, and have been included in Windows for decades. These driver removals will pass unnoticed for most people, but you might find active modems still in a few contexts, including some industrial control systems.

Two questions remain: how many more legacy modem drivers are still present on a fully-patched Windows asset, and how many more elevation-to-SYSTEM vulnerabilities will emerge from them before Microsoft cuts off attackers who have been enjoying living off the land[line] by exploiting an entire class of dusty old device drivers? Although Microsoft doesn’t claim evidence of exploitation for CVE-2023-31096, the relevant 2023 write-up and the 2025 removal of the other Agere modem driver have provided two strong signals for anyone looking for Windows exploits in the meantime. In case you were wondering, there is no need to have a modem connected; the mere presence of the driver is enough to render an asset vulnerable.

Secure Boot: critical security feature bypass

Today sees the publication of CVE-2026-21265, which is a critical security feature bypass vulnerability affecting Windows Secure Boot. Fifteen years is a very long time indeed in information security, but the clock is running out on the Microsoft root certificates which have been signing essentially everything in the Secure Boot ecosystem since the days of Stuxnet. Microsoft issued replacement certificates back in 2023, alongside CVE-2023-24932 which covered relevant Windows patches as well as subsequent steps to remediate the Secure Boot bypass exploited by the BlackLotus bootkit.

Once the ancient 2011 certificates expire later this year, Windows devices that do not have the new 2023 certificates can no longer receive Secure Boot security fixes. When updating the bootloader and BIOS, it is essential to prepare fully ahead of time for the specific OS and BIOS combination you’re working with, since incorrect remediation steps can lead to an unbootable system.

Microsoft lifecycle update

Visual Studio 2022 LTSC 17.10 reaches end of support today, so now is a good time to upgrade to a newer minor version. Dynamics CRM 2016 (also known as Dynamics 365) also reaches end of life. There are no other significant Microsoft product lifecycle changes this month.

A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Jan
A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Jan
A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Jan

Vulnerabilities by Product Family

Azure vulnerabilities

CVE

Title

Exploitation status

Publicly disclosed?

CVSS v3 base score

CVE-2026-21224

Azure Connected Machine Agent Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-21226

Azure Core shared client library for Python Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.5

CVE-2026-20965

Windows Admin Center Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.5

Developer Tools vulnerabilities

CVE

Title

Exploitation status

Publicly disclosed?

CVSS v3 base score

CVE-2026-21219

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

Exploitation Unlikely

No

7.0

ESU vulnerabilities

CVE

Title

Exploitation status

Publicly disclosed?

CVSS v3 base score

CVE-2026-20805

Desktop Window Manager Information Disclosure Vulnerability

Exploitation Detected

No

5.5

CVE-2026-20847

Microsoft Windows File Explorer Spoofing Vulnerability

Exploitation Unlikely

No

6.5

CVE-2023-31096

MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability

Exploitation More Likely

Yes

7.8

CVE-2026-20925

NTLM Hash Disclosure Spoofing Vulnerability

Exploitation Less Likely

No

6.5

CVE-2026-20872

NTLM Hash Disclosure Spoofing Vulnerability

Exploitation Less Likely

No

6.5

CVE-2026-20821

Remote Procedure Call Information Disclosure Vulnerability

Exploitation Unlikely

No

6.2

CVE-2026-21265

Secure Boot Certificate Expiration Security Feature Bypass Vulnerability

Exploitation Less Likely

Yes

6.4

CVE-2026-20831

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20860

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20839

Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability

Exploitation Unlikely

No

5.5

CVE-2026-20940

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-20820

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-0386

Windows Deployment Services Remote Code Execution Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20929

Windows HTTP.sys Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20816

Windows Installer Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20849

Windows Kerberos Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20833

Windows Kerberos Information Disclosure Vulnerability

Exploitation Less Likely

No

5.5

CVE-2026-20809

Windows Kernel Memory Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20875

Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability

Exploitation Less Likely

No

7.5

CVE-2026-20869

Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2024-55414

Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-20936

Windows NDIS Information Disclosure Vulnerability

Exploitation Unlikely

No

4.3

CVE-2026-20840

Windows NTFS Remote Code Execution Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20922

Windows NTFS Remote Code Execution Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20824

Windows Remote Assistance Security Feature Bypass Vulnerability

Exploitation Less Likely

No

5.5

CVE-2026-20828

Windows rndismp6.sys Information Disclosure Vulnerability

Exploitation Less Likely

No

4.6

CVE-2026-20843

Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20868

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Exploitation Less Likely

No

8.8

CVE-2026-20856

Windows Server Update Service (WSUS) Remote Code Execution Vulnerability

Exploitation Less Likely

No

8.1

CVE-2026-20927

Windows SMB Server Denial of Service Vulnerability

Exploitation Unlikely

No

5.3

CVE-2026-20919

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20921

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20926

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20934

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20848

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20834

Windows Spoofing Vulnerability

Exploitation Less Likely

No

4.6

CVE-2026-20931

Windows Telephony Service Elevation of Privilege Vulnerability

Exploitation Unlikely

No

8.0

Microsoft Office vulnerabilities

CVE

Title

Exploitation status

Publicly disclosed?

CVSS v3 base score

CVE-2026-20946

Microsoft Excel Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20955

Microsoft Excel Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20956

Microsoft Excel Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20950

Microsoft Excel Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20957

Microsoft Excel Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20949

Microsoft Excel Security Feature Bypass Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20943

Microsoft Office Click-To-Run Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2026-20953

Microsoft Office Remote Code Execution Vulnerability

Exploitation Less Likely

No

8.4

CVE-2026-20952

Microsoft Office Remote Code Execution Vulnerability

Exploitation Less Likely

No

8.4

CVE-2026-20958

Microsoft SharePoint Information Disclosure Vulnerability

Exploitation Less Likely

No

5.4

CVE-2026-20963

Microsoft SharePoint Remote Code Execution Vulnerability

Exploitation Less Likely

No

8.8

CVE-2026-20951

Microsoft SharePoint Server Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20947

Microsoft SharePoint Server Remote Code Execution Vulnerability

Exploitation Unlikely

No

8.8

CVE-2026-20959

Microsoft SharePoint Server Spoofing Vulnerability

Exploitation Less Likely

No

4.6

CVE-2026-20944

Microsoft Word Remote Code Execution Vulnerability

Exploitation Less Likely

No

8.4

CVE-2026-20948

Microsoft Word Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.8

SQL Server vulnerabilities

CVE

Title

Exploitation status

Publicly disclosed?

CVSS v3 base score

CVE-2026-20803

Microsoft SQL Server Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.2

Windows vulnerabilities

CVE

Title

Exploitation status

Publicly disclosed?

CVSS v3 base score

CVE-2026-20815

Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2026-20830

Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.0

CVE-2026-21221

Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.0

CVE-2026-20835

Capability Access Management Service (camsvc) Information Disclosure Vulnerability

Exploitation Less Likely

No

5.5

CVE-2026-20851

Capability Access Management Service (camsvc) Information Disclosure Vulnerability

Exploitation Less Likely

No

6.2

CVE-2026-20805

Desktop Window Manager Information Disclosure Vulnerability

Exploitation Detected

No

5.5

CVE-2026-20871

Desktop Windows Manager Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20814

DirectX Graphics Kernel Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2026-20836

DirectX Graphics Kernel Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2026-20962

Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability

Exploitation Less Likely

No

4.4

CVE-2026-20941

Host Process for Windows Tasks Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20812

LDAP Tampering Vulnerability

Exploitation Less Likely

No

6.5

CVE-2026-20842

Microsoft DWM Core Library Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2026-20847

Microsoft Windows File Explorer Spoofing Vulnerability

Exploitation Unlikely

No

6.5

CVE-2023-31096

MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability

Exploitation More Likely

Yes

7.8

CVE-2026-20925

NTLM Hash Disclosure Spoofing Vulnerability

Exploitation Less Likely

No

6.5

CVE-2026-20872

NTLM Hash Disclosure Spoofing Vulnerability

Exploitation Less Likely

No

6.5

CVE-2026-20821

Remote Procedure Call Information Disclosure Vulnerability

Exploitation Unlikely

No

6.2

CVE-2026-21265

Secure Boot Certificate Expiration Security Feature Bypass Vulnerability

Exploitation Less Likely

Yes

6.4

CVE-2026-20826

Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20827

Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability

Exploitation Unlikely

No

5.5

CVE-2026-20829

TPM Trustlet Information Disclosure Vulnerability

Exploitation Less Likely

No

5.5

CVE-2026-20811

Win32k Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20920

Win32k Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-20863

Win32k Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2026-20810

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20831

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20860

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20839

Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability

Exploitation Unlikely

No

5.5

CVE-2026-20844

Windows Clipboard Server Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.4

CVE-2026-20857

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-20940

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-20820

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20864

Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-0386

Windows Deployment Services Remote Code Execution Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20817

Windows Error Reporting Service Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20808

Windows File Explorer Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2026-20823

Windows File Explorer Information Disclosure Vulnerability

Exploitation Unlikely

No

5.5

CVE-2026-20932

Windows File Explorer Information Disclosure Vulnerability

Exploitation Unlikely

No

5.5

CVE-2026-20937

Windows File Explorer Information Disclosure Vulnerability

Exploitation Unlikely

No

5.5

CVE-2026-20939

Windows File Explorer Information Disclosure Vulnerability

Exploitation Unlikely

No

5.5

CVE-2026-20822

Windows Graphics Component Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20804

Windows Hello Tampering Vulnerability

Exploitation Unlikely

No

7.7

CVE-2026-20852

Windows Hello Tampering Vulnerability

Exploitation Less Likely

No

7.7

CVE-2026-20929

Windows HTTP.sys Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20825

Windows Hyper-V Information Disclosure Vulnerability

Exploitation Less Likely

No

4.4

CVE-2026-20816

Windows Installer Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20849

Windows Kerberos Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20833

Windows Kerberos Information Disclosure Vulnerability

Exploitation Less Likely

No

5.5

CVE-2026-20818

Windows Kernel Information Disclosure Vulnerability

Exploitation Unlikely

No

6.2

CVE-2026-20838

Windows Kernel Information Disclosure Vulnerability

Exploitation Less Likely

No

5.5

CVE-2026-20809

Windows Kernel Memory Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20859

Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20875

Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability

Exploitation Less Likely

No

7.5

CVE-2026-20854

Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.5

CVE-2026-20869

Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.0

CVE-2026-20858

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20865

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20877

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20918

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-20923

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20924

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20861

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20866

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20867

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-20873

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20874

Windows Management Services Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20862

Windows Management Services Information Disclosure Vulnerability

Exploitation Unlikely

No

5.5

CVE-2026-20837

Windows Media Remote Code Execution Vulnerability

Exploitation Less Likely

No

7.8

CVE-2024-55414

Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.8

CVE-2026-20936

Windows NDIS Information Disclosure Vulnerability

Exploitation Unlikely

No

4.3

CVE-2026-20840

Windows NTFS Remote Code Execution Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20922

Windows NTFS Remote Code Execution Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20824

Windows Remote Assistance Security Feature Bypass Vulnerability

Exploitation Less Likely

No

5.5

CVE-2026-20832

Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20828

Windows rndismp6.sys Information Disclosure Vulnerability

Exploitation Less Likely

No

4.6

CVE-2026-20843

Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability

Exploitation More Likely

No

7.8

CVE-2026-20868

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Exploitation Less Likely

No

8.8

CVE-2026-20856

Windows Server Update Service (WSUS) Remote Code Execution Vulnerability

Exploitation Less Likely

No

8.1

CVE-2026-20927

Windows SMB Server Denial of Service Vulnerability

Exploitation Unlikely

No

5.3

CVE-2026-20919

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20921

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20926

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20934

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20848

Windows SMB Server Elevation of Privilege Vulnerability

Exploitation Unlikely

No

7.5

CVE-2026-20834

Windows Spoofing Vulnerability

Exploitation Less Likely

No

4.6

CVE-2026-20931

Windows Telephony Service Elevation of Privilege Vulnerability

Exploitation Unlikely

No

8.0

CVE-2026-20876

Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

Exploitation Less Likely

No

6.7

CVE-2026-20938

Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8

CVE-2026-20819

Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability

Exploitation Less Likely

No

5.5

CVE-2026-20935

Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability

Exploitation Less Likely

No

6.2

CVE-2026-20853

Windows WalletService Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.4

CVE-2026-20870

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

Exploitation Less Likely

No

7.8


Read more

Recommended Jobs

Account Executive, Strategic

1st Floor, Reading, United Kingdom, RG7 4SA Sales & BD
Strategic Account Executive Rapid7 is seeking a curious, customer centric, and target driven Strategic Account Executive to join our UKI sales team. In this role, you will be responsible for growing your territory through a combination of expandin...

Regional Sales Leader - Northern Germany

Remote Location, Germany, 47929 Sales & BD
 We are looking for an experienced, people-focused Senior Sales Leader to join our Central EMEA Sales organisation and lead growth across Northern Germany. Based remotely within the region, you will be accountable for regional performance while bu...

Account Executive, Named

Remote Location, New Delhi, India, 560078 Sales & BD
Enterprise Account Executive - North & East- Delhi, NCR We can only consider candidates based in Delhi-NCR. Are you an experienced Enterprise Account Executive, ideally with a background in Cyber Security? Ready to join a high-growth, industry-sh...

Senior Campus Recruiter (Strategic Role)

Remote location, Pune, India, 411001 People Strategy
About the Team Rapid7's investment into a new office in India is a strategic move in strengthening our competitive edge and advancing our long term business growth. With a dynamic network of technology professionals, and proximity to highly regar...

Channel Account Manager, North Central

Remote Location, IL, United States, 62701 Sales & BD
As a Channel Account Manager, you are responsible for partner attainment against annual goals and milestones, managing over +30% growth for a dedicated territory. About the team: Reporting to the Senior Manager, Regional Channel Sales, the Chann...

Legal Counsel

V celnici 1031/4, Prague, Czechia, 110 00. 19 Chichester St, City Centre, Belfast, United Kingdom, BT1 4JB Business Support
Rapid7’s Legal team is seeking a Legal Counsel with a primary focus on supporting our go-to-customer organization as a commercial legal counsel. In this role, you will deliver proactive, practical, and business-focused legal advice across the enti...