Rapid7 Risk Management

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 2 days ago

  • Live Vulnerability Monitoring with Agents for Linux…and more

    A few months ago, I shared news of the release of the macOS Insight Agent. Today, I’m pleased to announce the availability of the the Linux Agent within Rapid7's vulnerability management solutions. The arrival of the Linux Agent completes the trilogy that Windows and macOS began in late 2016. For Rapid7 customers, all that really matters is you’ve got new capabilities to add to your kit.  Introduc...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 2 days ago

  • Metasploit Wrapup, 4.14.4 through 4.14.11

    Editor's Note: While this edition of the Metasploit Wrapup is a little late (my fault, sorry), we're super excited that it's our first ever Metasploit Wrapup to be authored by an non-Rapid7 contributor. We'd like to thank claudijd -long-time Metasploit contributor, Mozilla security wrangler, and overall nice guy - for writing this post. If other Metasploit contributors want to get involved with sp...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 4 days ago

  • The CIS Critical Security Controls Series

    What are the CIS Critical Security Controls? The Center for Internet Security (CIS) Top 20 Critical Security Controls (previously known as the SANS Top 20 Critical Security Controls), is an industry-leading way to answer your key security question: “How can I be prepared to stop known attacks?” The controls transform best-in-class threat data into prioritized and actionable ways to protect your or...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 4 days ago

  • Rapid7 urges NIST and NTIA to promote coordinated disclosure processes

    Rapid7 has long been a champion of coordinated vulnerability disclosure and handling processes as they play a critical role in both strengthening risk management practices and protecting security researchers. We not only use coordinated disclosure processes in our own vulnerability disclosure and receiving activities, but also advocate for broader adoption in industry and in government policies. B...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 4 days ago

  • The Shadow Brokers Leaked Exploits Explained

    The Rapid7 team has been busy evaluating the threats posed by last Friday’s Shadow Broker exploit and tool release and answering questions from colleagues, customers, and family members about the release. We know that many people have questions about exactly what was released, the threat it poses, and how to respond, so we have decided to compile a list of frequently asked questions.What’s the sto...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 week ago

  • Patch Tuesday - April 2017

    This month's updates deliver vital client-side fixes, resolving publicly disclosed remote code execution (RCE) vulnerabilities for Internet Explorer and Microsoft Office that attackers are already exploiting in the wild. In particular, they've patched the CVE-2017-0199 zero-day flaw in Office and WordPad, which could allow an attacker to run arbitrary code on a victim's system if they are able to ...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 week ago

  • InsightVM: Analytics-driven Vulnerability Management, All The Way To The End(point)

    In 2015 Rapid7 introduced the Insight platform, built to reduce the complexity inherent in security analytics. This reality was introduced first to our InsightIDR users, who now had the capabilities of a SIEM, powered by user behavior analytics (UBA) and endpoint detection. Soon we started to roll out new solutions and amplified other products with platform services, which significantly reduce the...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 2 weeks ago

  • New Vulnerability Remediation Display in Nexpose Gets You to a Fix Faster

    Background Information As part of the Nexpose 6.4.28 release on Wednesday, March 29th, we introduced a new way to view remediation solution data in both the Nexpose Console UI and the Top Remediations Report.Over the years, we’ve heard from our customers that the Top Remediations Report is one of the most useful features in our vulnerability management solution, but there’s always room for improve...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 2 weeks ago

  • Rapid7: Supporting the Community at BSides Boston

    One of the things I love about working at Rapid7 is how deeply this company embodies the concept of giving back to the Security Community. Whether it be discussing research on adversary analytics, attack methods for breaking out of sandboxes, or simply breaking into the industry - Rapid7 encourages its employees to actively participate in community events, both large and small. As a proponent of e...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 2 weeks ago

  • Introducing RubySMB: The Protocol Library Nobody Else Wanted To Write

    The Server Message Block (SMB) protocol family is arguably one of the most important network protocols to be conversant in as a security professional. It carries the capability for File and Print Sharing, remote process execution, and an entire system of Named Pipes that serve as access points to any number of services running on a machine, such as Microsoft SQL Server. For users of Metasploit, th...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 3 weeks ago

  • Cisco Enable / Privileged Exec Support

    In Nexpose version 6.4.28, we are adding support for privileged elevation on Cisco devices through enable command for those that are running SSH version 2. A fully privileged policy scan provides more accurate information on the target's compliance status, and the ability to do so through enable password, while keeping the actual user privilege low, adds an additional layer of security for your de...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 3 weeks ago

  • An American Idiot Abroad - Anecdotal Evidence

    Hi again, faceless readers! After looking at my pageview counts from the past few blogs, I have decided to return to the kind of nitpicking and exposure of ridiculous inconveniences that seems to bring in the readers. Just please don't tell me that the name-dropping was the true cause. Well, I have a lot of unrelated anecdotes and decided that, since I am always calling people out for making concl...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 3 weeks ago

  • Addressing the issue of misguided security spending

    It’s the $64,000 question in security – both figuratively and literally: where do you spend your money? Some people vote, at least initially, for risk assessment. Some for technology acquisition. Others for ongoing operations. Smart security leaders will cover all the above and more. It’s interesting though – according to a recent study titled the 2017 Thales Data Threat Report, security spending ...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 3 weeks ago

  • Introducing Interactive Guides

    Recently, Rapid7 took a step forward to deliver insight to our customers: our vulnerability management solutions now include the ability to deliver interactive guides. Guides are step-by-step workflows, built to deliver assistance to users at the right time. Guides are concise and may be absorbed with just a few clicks. They are available anytime on-demand within the user interface, so you can qui...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 3 weeks ago

  • R7-2016-28: Multiple Eview EV-07S GPS Tracker Vulnerabilities

    Seven issues were identified with the Eview EV-07S GPS tracker, which can allow an unauthenticated attacker to identify deployed devices, remotely reset devices, learn GPS location data, and modify GPS data. Those issues are briefly summarized on the table below. These issues were discovered by Deral Heiland of Rapid7, Inc., and this advisory was prepared in accordance with Rapid7's disclosure pol...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 4 weeks ago

  • Metasploit Wrapup

    Faster, Meterpreter, KILL! KILL!You can now search for and kill processes by name in Meterpreter with the new pgrep and pkill commands. They both have flags similar to the older ps command, allowing you to filter by architecture (-a), user (-u), or to show only child processes of the current session's process (-c). We've also added a -x flag to find processes with an exact match instead of a regex...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 4 weeks ago

  • The CIS Critical Security Controls Explained – Control 5: Controlled Use of Administrative Privilege

    The ultimate goal of an information security program is to reduce risk. Often, hidden risks run amok in organizations that just aren’t thinking about risk in the right way. Control 5 of the CIS Critical Security Controls can be contentious, can cause bad feelings, and is sometimes hated by system administrators and users alike. It is, however, one of the controls that can have the largest impact o...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • Exploiting Macros via Email with Metasploit Pro Social Engineering

    Currently, phishing is seen as one of the largest infiltration points for businesses around the globe, but there is more to social engineering than just phishing. Attackers may use email and USB keys to deliver malicious files to users in the hopes of gaining access to an organization’s network. Users that are likely unaware that unsolicited files, such as a Microsoft Word document with a macro, m...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • Combining Responder and PsExec for Internal Penetration Tests

    By Emilie St-Pierre, TJ Byrom, and Eric Sun Ask any pen tester what their top five penetration testing tools are for internal engagements, and you will likely get a reply containing nmap, Metasploit, CrackMapExec, SMBRelay and Responder.  An essential tool for any whitehat, Responder is a Python script that listens for Link-Local Multicast Name Resolution (LLMNR), Netbios Name Service (NBT-NS) and...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • Metasploit's RF Transceiver Capabilities

    The rise of the Internet of ThingsWe spend a lot of time monitoring our corporate networks. We have many tools to detect strange behaviors. We scan for vulnerabilities. We measure our exposure constantly. However, we often fail to recognize the small (and sometimes big) Internet of Things (IoT) devices that are all around our network, employees, and employees’ homes. Somewhat alarmingly – consider...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • Metasploit, Google Summer of Code, and You!

    Spend the summer with Metasploit I'm proud to announce that the Metasploit Project has been accepted as a mentor organization in the Google Summer of Code! For those unfamiliar with the program, their about page sums it up nicely:Google Summer of Code is a global program focused on introducing students to open source software development. Students work on a 3 month programming project with an open...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • Apache Struts Vulnerability (CVE-2017-5638) Protection: Scanning with Nexpose

    On March 9th, 2017 we highlighted the availability of a vulnerability check in Nexpose for CVE-2017-5638 – see the full blog post describing the Apache Struts vulnerability here. This check would be performed against the root URI of any HTTP/S endpoints discovered during a scan. On March 10th, 2017 we added an additional check that would work in conjunction with Nexpose’s web spider functionality...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • Patch Tuesday - March 2017

    Due in part to the delay of February's fixes, today's Patch Tuesday is a big one, comprising 18 bulletins split evenly between "Critical" and "Important" ratings. It's also significant as three of the bulletins (MS17-006, MS17-012, and MS17-013) contain fixes for vulnerabilities that were previously disclosed by external vendors and have exploit code publicly available. Administrators should prior...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • Protecting Your Web Apps with AppSpider Defend Until They Can Be Patched

    AppSpider scans can detect exploitable vulnerabilities in your applications, but once these vulnerabilities are detected how long does it take your development teams to create code fixes for them?  In some cases it could take several days to weeks before a fix/patch to resolve the vulnerability can be deployed, and during this time someone could be actively exploiting this issue in your applicatio...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • Pen Testing Cars with Metasploit and Particle.io Photon Boards

    TL;DRThis post details how to use the MSFRelay library for Photon boards to write your own Metasploit compatible firmware. Specifically for an add-on called Carloop. If you have a Carloop and just want it to work with Metasploit without having to write any code (or read this) then I’ve also provided the full code as a library example in the Particle library and can be found here. Photons ReadyPart...

Rapid7 Risk Management

Category: Content
Type: Blog Article

Generated 1 month ago

  • R7-2017-01: Multiple Vulnerabilities in Double Robotics Telepresence Robot

    This post describes three vulnerabilities in the Double Robotics Telepresence Robot ecosystem related to improper authentication, session fixation, and weak Bluetooth pairing. We would like to thank Double Robotics for their prompt acknowledgement of the vulnerabilities, and in addressing the ones that they considered serious. Two of the three vulnerabilities were patched via updates to Double Rob...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in