2 min
SMB Security is so Simple - Take Advantage of it Now.
This is a guest post from our frequent contributor Kevin Beaver
. You can read all of his previous guest posts here
.
Small and medium-sized businesses (SMBs) have it made in terms of security. No,
I'm not referring to the threats, vulnerabilities, and business risks. Those are
the same regardless of the size of the organization. Instead, I'm talking about
how relatively easy it is to establish and build out core information security
functions and o
3 min
Metasploit
Metasploit Weekly Wrapup: Aug. 12, 2016
Las Vegas 2016 is in The Books
This week's wrap-up actually covers two weeks thanks in large part to the yearly
pilgrimage to Las Vegas. I myself elected not to attend, but I'm told everyone
had a great time. Many on the team are still recuperating, but I'd wager that
they all enjoyed seeing you there as well. Here's to everyone's speedy
recovery.
Centreon Web UserAlias Command Execution
Our first new module this go-around exploits a remote command execution
vulnerability in Centreon Web via
3 min
Log Management
Using Log Data as Forensic Evidence
This is a guest post by Ed Tittel. Ed, a regular contributor to
blog.logentries.com , has been writing about
information security topics since the mid-1990s. He contributed to the first
five editions of the CISSP Study Guide (Sybex, 6e, 2012, ISBN:
978-1-119-31427-3) and to two editions of Computer Forensics JumpStart (Sybex,
2e, 2011, ISBN: 978-0-470-93166-0), and still writes and blogs regularly on
security topics for websites including Tom's IT Pro, GoCertify.co
3 min
IT Ops
4 Potential Security Issues Raised By Pokémon Go
Pokémon Go is a phenomenon. The game is objectively a success and has been
breaking mobile gaming records almost weekly. The game’s current success is
without being open in some significant markets and it shows no signs of slowing.
It is important to remind players to take measures to protect your company’s
interests when playing.
Pokémon Go is an Augmented Reality game. Players see the game’s fictional world
on top of everyday reality. Augmented Reality manifests in several ways: from
import
1 min
Public Policy
NIST 800-53 Control Mappings in SQL Query Export
In July, we added National Institute of Standards and Technology (NIST) Special
Publication 800-53r4 controls mappings to version 2.0.2 of the reporting data
model for SQL Query Export reports. NIST 800-53 is a publication that develops a
set of security controls standards that are designed to aid organizations in
protecting themselves from an array of threats.
What does this mean for you? Well, now you can measure your compliance against
these controls by writing SQL queries. For example, say
3 min
Komand
A Framework for Selecting and Implementing Security Tools Today
Security products are often purchased to either mark a compliance checkbox, have
the newest, shiniest tool on the market, or because of a great vendor pitch, but
those reasons don’t support a strategic approach to security posture.
With so many technologies out there today, we put together a simple and
straightforward framework you can use to make signal out of noise and select the
technology that fits your unique needs.
1. Hire People First
A big misstep that many organizations make is pickin
10 min
Komand
Building a Simple CLI Tool with Golang
Go offers a simple way to build command-line tools using only standard
libraries. So I put together a step-by-step example to help walk you through the
process.
To write a Go program, you’ll need Go setup up on your computer
. If you’re not familiar with Go and want to
spend a little extra time learning, you can take the Go tour
to get started!
In this example, we’ll create a command-line tool called stringparse, that will
cou
4 min
Automation and Orchestration
Bro Series: The Programming Language
Synopsis:
Bro is a network security monitoring platform. The reason
for calling it a platform is due to the fact that Bro is a domain specific
programming language and a collection of tools and APIs. Together, they comprise
a platform for network monitoring. In this article, we will attempt to solidify
the fact that Bro is a language by using it as such.
Data Types
The Bro scripting language supports the following built-in types
1 min
IT Ops
Integrating Logentries with OpsGenie: 3 Easy Steps
Real-time alerts are
only as good as their ability to successfully reach their intended audience. If
an alert recipient only checks email once every several hours, email alerts
would not be well suited for real-time notification.
It’s for this reason that Logentries makes it easy to integrate with popular 3rd
party tools that DevOps professionals are already using, including Slack
8 min
Komand
Defender Spotlight: April C. Wright of Verizon Enterprise Services
Welcome to Defender Spotlight! In this weekly blog series, we interview
cybersecurity defenders of all varieties about their experience working in
security operations. We’ll inquire about their favorite tools, and ask advice on
security topics, trends, and other know-how._
Today, we're talking with April Wright. She is currently working for Verizon
Enterprise Services as a Security Program Lead, and is a fellow lover of
security defenses. April is devoted to teaching, creating, learning, and he
5 min
Metasploit
Pentesting in the Real World: Going Bananas with MongoDB
This is the 4th in a series of blog topics by penetration testers, for
penetration testers, highlighting some of the advanced pentesting techniques
they'll be teaching in our new Network Assault and Application Assault
certifications, opening for registration this week. For more information, check
out the training page at
www.rapid7.com/services/training-certification/penetration-testing-training.jsp
Prefa
4 min
IT Ops
Exporting Logentries data with Leexportpy
Leexportpy, the Logentries utility that exports your log data to 3rd parties,
has built-in support for various services such as Kafka, Geckoboard and Hosted
Graphite. Without any modification to the current code, you can use these
services to extract your Logentries data.
To begin, make sure your read-write or read-only API key is correctly placed in
the LE section of your configuration file as shown below. Also make sure you
have read the first blog post of this series.
4 min
Application Security
AppSpider application security scanning solution deepens support for Single Page Applications - ReactJS
Today, Rapid7 is pleased to announce an AppSpider (application security
scanning) update that includes enhanced support for JavaScript Single Page
Applications (SPAs) built with ReactJS. This release is significant because SPAs
are proliferating rapidly and increasingly creating challenges for security
teams. Some of the key challenges with securing SPA's are:
1. Diverse frameworks - The diversity and number of JavaScript frameworks
contributes to the complexity in finding adequate scan co
7 min
IT Ops
What exactly is an Event-loop?
“The price of reliability is the pursuit of the utmost simplicity” – C.A.R Hoare
Rather than doing another all-out performance post, I’ll look at some aspects of
asynchronous I/O today instead: what it is at a high level, what it isn’t and
why you would use it.
There aren’t many aspects of programming today that are as saturated with
buzzwords and misinformation as asynchronous IO and some of the frameworks which
build on top of this. If you work with server code which has to handle a
nontri
4 min
Komand
How Security Orchestration Can Stop Insider and Outsider Attacks
Running a successful security operations center
(SOC) is a tall order. It requires assembling an ideal mix of people,
processes,
and tools
, and connecting them in ways that make it possible to respond to threats fast
while also maintaining a strategic overall security posture.
One of the best ways to make sure that a SOC runs seamlessly is