2 min
Hacky Holidays 2021
Hacky Holidays From Rapid7! Announcing Our New Festive Blog Series
We're announcing a new name and fresh approach to our annual series of festively themed security content: Hacky Holidays!
3 min
Application Security
OWASP Top 10 Deep Dive: Identification and Authentication Failures
Security pros have made progress in mitigating identification and authentication failures — but that doesn't mean we can takes our eyes off the ball.
2 min
Emergent Threat Response
Ongoing Exploitation of Windows Installer CVE-2021-41379
On November 22, 2021, security researcher Abdelhamid Naceri found that Microsoft's initial patch for CVE-2021-41379 did not remediate the vulnerability.
2 min
Emergent Threat Response
Active Exploitation of Apache HTTP Server CVE-2021-40438
In September 2021, Apache released a fix for CVE-2021-40438, a critical SSRF vulnerability. Several sources now confirm they have seen exploit attempts in the wild.
3 min
Metasploit
Metasploit Wrap-Up: Nov. 26 2021
Self-Service Remote Code Execution
This week, our own @wvu-r7 added an exploit module
that achieves
unauthenticated remote code execution in ManageEngine ADSelfService Plus, a
self-service password management and single sign-on solution for Active
Directory. This new module leverages a REST API authentication bypass
vulnerability identified as CVE-2021-40539
, where
7 min
Application Security
OWASP Top 10 Deep Dive: Defending Against Server-Side Request Forgery
In this post, we'll focus on server-side request forgery (SSRF), which comes in at number 10 on the updated OWASP Top 10 list.
3 min
InsightIDR
Is it the End of the Cybersecurity Skills Gap Crisis Yet?
The cybersecurity skills crisis is stuck in its fifth straight year of zero-progress. XDR may be able to change that.
3 min
Metasploit
Metasploit Wrap-Up: 11/19/21
Azure Active Directory login scanner module
Community contributor k0pak4 added a new login
scanner module for Azure Active Directory
. This module
exploits a vulnerable
authentication endpoint in order to enumerate usernames without generating log
events. The error code returned by the endpoint can be used to discover the
validity of user
6 min
Security Operations
A First-Year CISO Shares Her Point of View
On Thursday, November 17, Katie Ledoux, CISO at Attentive, joined Rapid7's Bob Rudis to dive into how she's approaching 2022 planning.
3 min
Cloud Security
Make Room for Cloud Security in Your 2022 Budget
Are you thinking about cloud security when making your 2022 budget? You should be.
2 min
InsightVM
Distribute Reports to Email Addresses in InsightVM
A new email reports feature in InsightVM allows users to easily and quickly distribute reports to users who may not have access to the platform.
4 min
Security Operations
2022 Planning: Prioritizing Defense and Mitigation Through Left of Boom
In this post, we'll use ransomware as an example for 3 areas where you can apply a left-of-boom approach in your defenses in the coming year.
8 min
Metasploit
Announcing the 2021 Metasploit Community CTF
It’s time for another Metasploit community CTF! Our goal is to enable relationship building and knowledge sharing across the security community.
4 min
Public Policy
Thawing Out the Chilling Effect Of DMCA Section 1201
The Copyright Office issued the latest rules on security research under DMCA Section 1201. Good news: researchers' legal protections have been strengthened with the removal of the "all other laws" requirement.
3 min
SOAR
Better Together: XDR, SOAR, Vulnerability Management, and External Threat Intelligence
Effectively prioritizing security incidents comes down to having the right data and intelligence from inside your IT environment and the world outside.