5 min
Managed Detection and Response (MDR)
How Attackers Can Harvest Users’ Microsoft 365 Credentials with New Phishing Campaign
In this blog post, Rapid7's MDR services team outlines a unique phishing campaign that utilizes a novel method of scraping organizations’ branded Microsoft 365 tenant login pages to produce highly convincing credential harvesting pages.
8 min
AWS
Automating the Cloud: AWS Security Done Efficiently
Today, we are going to be installing software on all your existing EC2 instances across several (or all!) accounts under an organization in AWS.
5 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 8/16/19
Hacker Summer Camp
Last week, the Metasploit team flew out to sunny, hot, and dry Las Vegas for
Hacker Summer Camp (Black Hat, BSidesLV, and DEF CON). It was a full week of
epic hacks, good conversation, and even a little business!
If you managed to catch us at our Open Source Office Hours
(previously
OSSM, the Open Source Security Meetup) in Bally's, we just wanted to say
thanks for making the trek through the
2 min
Penetration Testing
This One Time on a Pen Test: How I Compromised a Healthcare Portal Before My Hot Cocoa Went Cold
Here is the story of how I used a simple SQL injection attack to compromise a healthcare portal.
3 min
InsightConnect
Responding to Cloud-Based Security Incidents with InsightConnect: AWS Security Hub
In this post, we’ll show you firsthand how security orchestration and automation (SOAR) helps teams accelerate their response to cloud-based threats.
4 min
Events
Black Hat, DEF CON, and BSides 2019: Highlights and Emerging Industry Trends
As Hacker Summer Camp comes to a close, we sat down with a few friends in the security space to discuss the major highlights from Black Hat, DEF CON, and BSides .
2 min
Patch Tuesday
Patch Tuesday - August 2019
First off, the big news for today's Patch Tuesday
: Microsoft has fixed four new Remote Desktop Services (RDS) vulnerabilities,
reminiscent of the BlueKeep
vulnerability (CVE-2019-0708
) that was patched last May. CVE-2019-11
2 min
Vulnerability Management
August 2019 Microsoft Remote Desktop Services (RDP) Patches: What You Need to Know
A new set of vulnerabilities in RDP impact every modern version of Windows. Here's what you need to know.
4 min
Cloud Infrastructure
Cloud Security Primer: The Basics You Need to Know
What do you need to do to secure your cloud-based systems while enjoying the competitive benefits of the cloud? Read this blog to find out.
4 min
tCell
How to Protect the File System from Your App with WAFs and RASP
The new Local Files protection in tCell joins other RASP protections to defend against serious compromises.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 8/9/19
Keep on Bluekeepin’ on
TomSellers added a new option to the
increasingly useful Bluekeep Scanner module
that allows execution of a DoS attack when running the module. This adds a new
level of effectiveness in proving the severity of this vulnerability.
As part of this update, TomSellers moved and
refactored a lot of
2 min
Penetration Testing
This One Time on a Pen Test: Paging Doctor Hackerman
In this blog, one of our penetration testers tells the story of how he hacked X-ray machine and got the keys to the entire network.
4 min
InsightIDR
The Importance of Preventing and Detecting Malicious PowerShell Attacks
In this blog, we will discuss why organizations should care about malicious PowerShell activity, how attackers use PowerShell to steal credentials, and how to prevent and detect malicious PowerShell activity.
5 min
InsightIDR
How to Monitor Your AWS S3 Activity with InsightIDR
In this blog, we discuss AWS S3 buckets and how Rapid7's InsightIDR can help you monitor important activity.
6 min
Application Security
Should You Use a SAST, DAST, or RASP Application Security Tool?
In this blog, we discuss all things web applications and how to select the right application security solution to keep them safe from attack.