5 min
Rapid7 Perspective
Actually, Grindr is Fine: FUD and Security Reporting
On Wednesday, March 28, NBC reported Grindr security flaws expose users'
location data
, a story which ticks a couple hot-button topics for security professionals and
security reporters alike. It’s centered around the salacious topic of online
dating in the LGBT community, and hits a personal safety concern for people
using the app everywhere, not to mention the possibility of outing
3 min
Vulnerability Management
Cisco Smart Install (SMI) Remote Code Execution
What You Need To Know
Researchers from Embedi discovered
(and responsibly disclosed) a stack-based buffer overflow weakness in Cisco
Smart Install Client code which causes the devices to be susceptible to
arbitrary remote code execution
without
authentication.
Cisco Smart Install (SMI) is a “plug-and-play” confi
4 min
InsightIDR
How to detect weak SSL/TLS encryption on your network
In this blog, we break down how to detect SSL/TLS encryption on your network.
4 min
Application Security
3 Ways to Accelerate Web App Security Testing
It used to be that web application security testing
was the job of just the
security team. Today, it is becoming a much more integrative function,
especially for organizations who have adopted DevOps. Development cycles have
become shorter and features are released more frequently for companies to stay
competitive. Trouble is, with shorter development cycles, security needs a way
to keep up. After all, there’s little value in running fast
6 min
CIS Controls
CIS Critical Control 11: Secure Configurations for Network Devices
This blog is a continuation of our blog series on the CIS Critical Controls
.
We’ve now passed the halfway point in the CIS Critical Security Controls
. The 11th
deals with Secure Configurations for Network Devices. When we say network
devices, we’re referring to firewalls, routers, switches, and network IDS
setup
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 3/23/18
Adding some named pipes to everyone's favorite series of tubes
UserExistsError already added 64-bit named pipe payloads, and this week, we got
an extra-special upgrade: now Metasploit has 32-bit named pipe payloads! It may
feel wrong not setting a port, but connecting to existing network resources
feels so right!
It is the Final Countdown for GSoC!
The final deadline for Google Summer of Code applicants is March 27th, so get
your applications in now! We are honored to be a part of the progra
2 min
InsightIDR
How to detect new server ports in use on your network
In this blog, we discuss how to detect new server ports in use on your network.
3 min
GDPR
GDPR Preparation March and April: Course Correct
Wow, how did March just happen? Living in a country that just fell apart like a
clown car because of snow, it’s still feeling decidedly wintery here in the UK,
and as a weather obsessed Brit I am fully looking forward to sunnier times. You
know, that single day sometime in August. By that time, we’ll have crossed the
border into the brave new world of the General Data Protection Regulation (GDPR)
, and like many of you, I am
curious as to what t
3 min
Threat Intel
Rapid7 Threat Report: Q4 2017 Q4 Threat Report and 2017 Wrap-up
Welcome to Rapid7’s Q4 report, featuring our first annual threat report wrap-up!
2017 Quarterly Threat Report: Q4 and 2017 Wrap-Up
Get the Full Report
We could not have picked a better year to start doing this, as 2017 was one for
the books. While we spent most of the year falling headfirst into a world where
nation-state tools are available for anyone to use, the worm re-emerged (now
evolved
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 3/16/18
Return of the GSoC!
The Metasploit project is proud to return to Google Summer of Code this year.
Student applications are open until March 27th, so there's still time to get in!
Coding begins on May 14th, and we're eager to hear what you'd like to see added
to Metasploit. Not only do you get to work on a cool project, but you'll get
paid too !
Need some inspiration? Check out our list of project ideas
2 min
Stateful WAF AKA the Bronze Age
The first post in this series kicked off our history series on the development
of web application firewalls
, with a discussion of
what the earliest technology was capable of. Early WAFs were based on pattern
recognition. That made them fast, but it also made it easy for attackers to
sidestep the rigid patterns that were the building blocks of the first-gen WAF.
If the problem is that stone age WAFs have stateless rules, then the obvious
3 min
Vulnerability Management
Rapid7 Named a Leader in Forrester Wave for Vulnerability Risk Management
Today, we’re excited to announce a major milestone for InsightVM
: Recognition as a Leader in The
Forrester Wave™: Vulnerability Risk Management, Q1 2018, earning top scores in
both the Current Offering and Strategy categories. We are proud of the
achievement not only because of years of hard work from our product team, but
also because we believe that it represents the thousands of days and nights
spent working with customers to understand the challen
4 min
Vulnerability Disclosure
R7-2018-01 (CVE-2018-5551, CVE-2018-5552): DocuTrac Office Therapy Installer Hard-Coded Credentials and Cryptographic Salt
DocuTrac QuickDoc & Office Therapy ships with a number of static accounts which are not disclosed to the end user.
2 min
Patch Tuesday
Patch Tuesday - March 2018
There are a lot of fixes this month
: Microsoft's updates include patches for 76 separate vulnerabilities, including
two critical Adobe Flash Player remote code execution (RCE) vulnerabilities
.
In fact all of this month's critical vulnerabilities are browser-related. This
is not surprising considering web brows
4 min
CIS Controls
CIS Critical Control 10: Data Recovery Capability
hope you enjoyed your stop at Center for Internet Security (CIS) Critical
Control 9: Limitation and Control of Network Ports, Protocols, and Services
! If you missed the previous stops on this journey, please check out our full
blog series on the CIS Top 20 Critical Controls
; each blog provides
educational information regarding the control of focus