4 min
AWS
Securing Buckets with Amazon S3 Block Public Access
Amazon Web Services recently introduced a new security enhancement to its cloud storage service: Amazon S3 Block Public Access.
2 min
Metasploit
Metasploit Wrapup 12/7/18
If you are tired of all the snake memes and images we pushed out as we stood up support for python external modules over the last year or so, I have terrific news for you!
3 min
Application Security
Single-Page Applications: The Journey So Far
While modern web application technology has made apps more useful, it's also made them harder to secure.
4 min
AWS
Seeing Security Scale: Rapid7’s Recap of AWS re:Invent 2018
In this post, I will detail my time at AWS re:Invent and provide observations about how security plays a role in our cloud journey.
5 min
InsightVM
Did You Remediate That? New InsightVM Executive Report Provides Key Details on Team Progress
We have developed the InsightVM Executive Report so that companies can easily report on month-over-month trends in their vulnerability management programs.
2 min
Metasploit
Congrats to the 2018 Metasploit Community CTF Winners
After three days of fierce competition, we have the winners of this year's
Metasploit community CTF
. We've included some high-level stats from the game below; check out the
scoreboard. If you played the CTF this weekend and want to let the Metasploit
team know which challenges you found exhilarating, interesting, or infuriating
(in a good way, of course).
Congratulations to everyone who teamed up with
4 min
Metasploit Weekly Wrapup
Metasploit Wrapup 11/30/18
Why can't I hold all these Pull Requests?
It has been a busy month here in Metasploit-land, with the holidays, the holiday
community contributions, and our community CTF
. It doesn't help
that the last few months have seen our open pull request count keep climbing as
well, reaching over 90 at times. Our fearless leader, busterb
, decided to take on the challenge and landed over
20 PRs by himself in the last tw
4 min
Automation and Orchestration
Automation: The Ultimate Enabler for Threat Detection and Response
In our recent webcast series, we explain how companies can accelerate across their entire threat detection and response lifecycle by leveraging automation.
3 min
Cloud Security
Deploying Kubernetes Across Multiple Clouds
Kubernetes is essentially a container orchestration platform. It is not a container runtime (software that executes containers and manages container images on a node), meaning it doesn’t replace Docker.
5 min
Threat Intel
How Retailers Can Protect Against Magecart This Black Friday and Holiday Season
Online credit card-skimming malware Magecart is now a looming threat to nearly every retailer this Black Friday and throughout the rest of the holiday season (and beyond).
7 min
Log Management
Rolling with Your Logs, Part 3: Using Regex to Expand Your Search Options
In this final installment of our Log Search series, we’ll look at some simple regular expressions that will greatly expand your Log Search options.
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 11/16/18
The Malicious Git HTTP Server For CVE-2018-17456 module by timwr exploits a vulnerability in Git that can cause arbitrary code execution when a user clones a malicious repository using commands such as git clone --recurse-submodules and git submodule update.
3 min
Incident Detection
5 Tips For Monitoring Network Traffic on Your Network
Monitoring traffic on your network is important if you want to keep it secure. These five tips will help you get the most out of your (NTA) tool.
5 min
User Behavior Analytics
[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics
VP of Product Sam Adams explains how UBA works and how it’s evolved over the years to become a core part of threat detection and response strategies.
6 min
InsightIDR
Rolling with Your Logs, Part 2: Advanced Mode Searches
In the Part 2 of this three-part series on InsightIDR Log Search, we will cover three concepts: parsed logs, groupby function, and log search operations.