7 min
IT Ops
Logging in a Software Defined Network
Background
This blog will give an overview of Software Defined Networks (SDN), present some
suggestions for logging in an SDN and finally present an overview of some
research work we are doing on SDN logging.
If we consider a Software Defined Network (SDN) paradigm is a racetrack, SDN
controllers are race cars. Networking vendors especially those in the
telecommunication area such as Deutsche Telecom, Orange, Vodafone use their own
SDN controllers to manage the orchestration of their own equi
3 min
Automation and Orchestration
3 Steps to Transform Your Security Operations with Security Orchestration
Considering the sheer number of security tools and threats out there today,
security operations
can quickly
get overwhelming if you don’t have a way to manage the complexities in a
systematic fashion. Much of this management between tools and processes is done
manually by people today, but this way isn’t exactly sustainable in the long
term for security teams — especially coupled with an increasing volume of
alerts, events, and s
2 min
Komand
Inspirational Hacker Photos, and a Chance to Get Yours at BSides Boston!
If you’ve never seen a hacker in action, it might look a little something like
this (according to stock photos):
Cool hues with a vignette that captures a dark figure in a black hoodie, hunched
over a laptop with a magnifying glass, and a digital rain backdrop to accent the
mood.
Does this sound like you after a night of intense keyboard clacking? As your
neighborhood defenders, we can appreciate a good hacker photo when we see one.
Which is why we’re offering a chance for you to get your very
1 min
Microsoft
Patch Tuesday - April 2017
This month's updates deliver vital client-side fixes, resolving publicly
disclosed remote code execution (RCE) vulnerabilities for Internet Explorer and
Microsoft Office that attackers are already exploiting in the wild. In
particular, they've patched the CVE-2017-0199
zero-day flaw in Office and WordPad, which could allow an attacker to run
arbitrary code on a victim's system if they are able to successfully soc
3 min
InsightVM
InsightVM: Analytics-driven Vulnerability Management, All The Way To The End(point)
In 2015 Rapid7 introduced the Insight platform, built to reduce the complexity
inherent in security analytics. This reality was introduced first to our
InsightIDR users, who now had the
capabilities of a SIEM , powered by user
behavior analytics (UBA)
and endpoint detection
. Soon we
started
3 min
Komand
Close the Vendor Vulnerability Gap with Automation Powered by Komand
Many security operations teams still struggle with managing vulnerabilities,
especially in conjunction with vendor and third-party software. The vendor
notification <-> triage <-> patch cycle often requires careful coordination to
ensure that critical bugs get reviewed and patches applied quickly, while
balancing the risk of downtime and other issues that can arise due to unstable
patches or system incompatibilities.
Before Komand, monitoring and coordinating vendor vulnerability response was
3 min
Automation and Orchestration
Advanced Encryption Standard (AES)
Synopsis
There are many data encryption
methods or standards
which are available in the market. We intend to learn all of them and implement
them as the need arises. Initially, they were secure but as the technology
progressed over years, the security they offered was not enough to deal with
growing security and data integrity threats. We will start our discussion with
one of the most popular standard, Advanced Encryption Standard, AES.
Int
3 min
Automation and Orchestration
How to Configure ModSecurity with Apache on Ubuntu Linux
Synopsis
Apache web server is most widely used web server around the world. So web server
security is crucial part for every system administrator. There are many tools
and techniques are used to secure Apache web server. Among theme mod_security is
one of the important Apache modules that provides intrusion detection and
prevention for web servers.mod_security is used for real-time web application
monitoring, logging, and access control. mod_security is used to protect web
server from various ty
2 min
Automation and Orchestration
How to Configure ModEvasive with Apache on Ubuntu Linux
Synopsis
Mod_evasive is an Apache module that can be used to protect against various
kinds of attacks on the Apache web server including DDoS, DoS and brute force.
Mod_evasive provide evasive action in the event of attacks and reports malicious
activity via email and syslog. It works by inspecting incoming traffic to an
apache web server using a dynamic hash table of IP addresses and URLs, then
blocks traffic from IP addresses that exceed a predetermined threshold.
Here, we will going to explai
4 min
IT Ops
Network Administrator’s Guide to Surviving an Audit: Preparation
Sooner or later, your organization will likely be the subject of an IT audit.
But as ominous as that sounds, it doesn’t have to be something to dread. If
you’re a network administrator, you’ll have a specific role in an audit. Since
audits are rarely small projects, you’ll likely be working with others
throughout the process. The best way to fulfill your specific role well is to be
prepared for an audit before it happens. Simply put, an audit is an examination
to determine if controls are suff
1 min
Microsoft
Cisco Enable / Privileged Exec Support
In Nexpose version 6.4.28, we are
adding support for privileged elevation on Cisco devices through enable command
for those that are running SSH version 2.
A fully privileged policy scan provides more accurate information on the
target's compliance status, and the ability to do so through enable password,
while keeping the actual user privilege low, adds an additional layer of
security for your devices. This allows our users to run fully privileged po
2 min
Top 3 Reasons to Get Started with Content Security Policy
Content Security Policy (CSP) was proposed to assist the browser in determining
what elements are approved, both in the page and loaded via reference to 3rd
party sites. For example, one of the web’s most common vulnerabilities is
Cross-Site Scripting (XSS).
Its prevalence is helped most by the extremely trusting and flexible way
browsers execute HTML & JavaScript and the common case of displaying
user-supplied input back to the user. CSP is an HTTP response header that
instructs browsers what
2 min
Endpoint Security
Addressing the issue of misguided security spending
It's the $64,000 question in security – both figuratively and literally: where
do you spend your money? Some people vote, at least initially, for risk
assessment. Some for technology acquisition. Others for ongoing operations.
Smart security leaders will cover all the above and more. It's interesting
though – according to a recent study titled the 2017 Thales Data Threat Report
10 min
Komand
Investigating Our Technology — Internet of Things or Internet of Threats?
One cold winter afternoon as I sat in my office, cursing the air several degrees
warmer around me due to slow internet connectivity, I thought to take a look at
exactly the issue was. I had recently installed a new system of wireless access
points which should be blanketing the entire house with a strong enough signal
to make the air glow well out into the yard.
I logged into the controller for the APs, which helpfully provided all manner of
statistics regarding the different devices connected,
6 min
Vulnerability Disclosure
R7-2016-28: Multiple Eview EV-07S GPS Tracker Vulnerabilities
Seven issues were identified with the Eview EV-07S GPS tracker, which can allow
an unauthenticated attacker to identify deployed devices, remotely reset
devices, learn GPS location data, and modify GPS data. Those issues are briefly
summarized on the table below.
These issues were discovered by Deral Heiland of Rapid7, Inc., and this advisory
was prepared in accordance with Rapid7's disclosure policy.
Vulnerability DescriptionR7 IDCVEExploit VectorUnauthenticated remote factory
resetR7-2016-28