6 min
Vulnerability Management
Patch Tuesday - February 2022
February 2022's fixes from Microsoft are relatively light as far as Patch Tuesdays go.
4 min
Threat Intel
The Big Target on Cyber Insurers' Backs
According to our research, cyber insurance providers are highly targeted in the insurance space. Find out why and what they can do to protect themselves.
3 min
Cloud Security
Why Security in Kubernetes Isn't the Same as in Linux: Part 2
Security for Kubernetes might not be quite the same as what you're used to. This post covers the security concerns unique to Kubernetes.
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up: Feb. 4, 2022
A new NOP module, improvements to RPC functionality and PHP Meterpreter, and WordPress and Cisco RV exploits.
2 min
Career Development
7 Rapid Questions With Our APAC Sales Manager, Soumi
For this installment of 7 Rapid Questions, we sat down with Soumi Mukherjee, APAC Sales Manager - ANZ North Sales.
6 min
Detection and Response
Velociraptor Version 0.6.3: Dig Deeper With More Speed and Scalability
Velociraptor release 0.6.3 has been in the making for a few months now and has several exciting new features.
3 min
Detection and Response
Demystifying XDR: Where SIEM and XDR Collide
Forrester analyst Allie Mellen shares her perspective on SIEM vs. XDR and how the two can coexist within today's SOC teams.
5 min
Detection and Response
2021 Cybersecurity Superlatives: An InsightIDR Year in Review
We laughed, we cried, we added over 750 new detections.
3 min
Metasploit
Metasploit Weekly Wrap-Up: Jan. 28, 2022
A new Log4Shell module for unauthenticated RCE on Ubiquiti UniFi devices, getsystem improvements, and more!
4 min
Cloud Security
Why Security in Kubernetes Isn't the Same as in Linux: Part 1
Deploying your product on a Kubernetes cluster has a different security cost than on a traditional Linux server.
6 min
Ransomware
How Ransomware Is Changing US Federal Policy
The increased stakes of the ransomware threat are pushing regulators to take a harder look at whether regulatory requirements for cybersecurity safeguards are effective.
3 min
InsightIDR
The Great Resignation: 4 Ways Cybersecurity Can Win
Cybersecurity has had a talent shortage for years. Here are four ideas about how to prepare for it and win.
2 min
Metasploit
Metasploit Weekly Wrap-Up: 1/21/22
while (j==shell); Log4j;
The Log4j loop continues as we release a module targeting vulnerable vCenter
releases. This is a good time to suggest that you check your vCenter releases
and maybe even increase the protection surrounding them, as it’s been a rough
year-plus for vCenter
.
Let your shell do the walking
bcoles sent us a module that targets Grandstream
GXV3175IP phones that allows remote code exec
3 min
Ransomware
Is the Internet of Things the Next Ransomware Target?
What would it take for IoT to be the target of ransomware? This post takes a closer look.
3 min
Research
Open-Source Security: Getting to the Root of the Problem
The past few weeks have shown us the importance and wide reach of open-source security.