All Posts

3 min InsightIDR

How To Detect Unauthorized DNS Servers On Your Network

DNS was never designed as a very secure protocol, and it is a popular target for attackers. Here is how you can detect unauthorized DNS servers on your network

1 min Metasploit Weekly Wrapup

Metasploit Wrapup 1/19/18

Metasploit 5 Development Has Begun It's 2018, the ice is melting in Austin, and as we hinted last October , Metasploit 5 development efforts have begun in earnest. We have a laundry list of features that we are working on for it. The first feature merged in Metasploit 5 replaces the module cache, which decreases the memory used

2 min

Think Like a Hacker: Going Beyond Network Security

From health care companies to credit agencies and telecommunication firms, hackers didn’t hold back in 2017. With no simple solution to hacking on the horizon, it’s a safe bet that 2018 will come with its own share of data breaches, compromises and concerns. Short of pulling the plug and living in the dark, how can companies protect their data and beat hackers at their own game? It’s all in your head. Key Characteristics To Thinking Like A Hacker Here’s the bottom line: IT security fai

4 min InsightVM

A RESTful API for InsightVM

With 2017 firmly in the rear-view mirror, we peer forward into 2018 and thanks to genre-bending vulnerabilities like Meltdown and Spectre the future would seem a bit blurry. Louis Pasteur is attributed with the quote: “Chance favors the prepared mind.” Pasteur’s work precedes information security as we know it today by a century, but as an an individu

3 min InsightAppSec

3 Questions to Ask When Prioritizing Web Application Vulnerabilities

Dynamic application security testing (DAST) often results in a constantly evolving list of security vulnerabilities. When scanning a web application in production or in an active testing environment, issues can crop up as quickly as changes happen within the app. And when exposed to the internet itself, there are many more ways in which security vulnerabilities

6 min Log Management

Taking a Message-Based Approach to Logging

When you think about it, a log entry is really nothing more than a message that describes an event. As such, taking a message-based approach to logging by utilizing messaging technologies makes sense. Messaging creates the loose coupling that allows a logging system to be adaptable to the needs at hand and extensible over time. Understanding a Standard Logging Architecture Typically, logging is implemented in an application using a logger

2 min Metasploit Weekly Wrapup

Metasploit Wrapup: Jan. 12, 2018

'Sploits! Get yer 'sploits heeere! Lots of fresh modules this week with six shiny new exploits to showcase—but first, a blast from the past: 1992 Called Solaris wants to help you get password hashes and they've invented the NIS protocol. The next time you find a Solaris box, locked in a closet, that three generations of sysadmins have been afraid to touch, you can dump hashes straight to your Metasploit loot

6 min Automation and Orchestration

How to Choose a Security Orchestration and Automation Platform

In the market for a security orchestration and automation platform but don’t know what solution is right for you? Or perhaps you’ve made some rushed decisions with past products and want to take a more careful approach this time around? We get it — sifting through all different security orchestration options on the market today is no walk in the park. At the end

4 min Application Security

4 Differences Between Network Security & Application Security

Tomato, tomato, potato, potato, network security and web application security . Two things that may seem similar, they are actually quite different. Network security (also known as vulnerability assessment or vulnerability management ) has been around for quite some time and is something most security practition

4 min GDPR

GDPR Preparation Checklist: January – Teach and Tidy

New year, new things to think about when it comes to your GDPR compliance preparations. Hopefully your GDPR project is in full swing by now. If it’s not, then you do really need to be getting your skates well and truly on. Do take a look through our November and December

3 min Patch Tuesday

Patch Tuesday - January 2018

The first Microsoft patches of 2018 came early, with new updates released late Wednesday, January 3rd. Although this was due to the (somewhat ) coordinated disclosure of the Meltdown and Spectre vulnerabilities, last week’s updates also contained fixes for 33 additional CVEs. These days, Microsoft releases their OS updates as monolithi

3 min Metasploit Weekly Wrapup

Metasploit Wrapup 1/5/18

2018: a new year, new vulns, and endless opportunities to exploit them. The Metasploit community is kicking off the year with a variety of new content, functionality, research, and coordinated vulnerability disclosure. New Year, New Vulns After a couple months of coordinated disclosure work, long-time Metasploit contributor Karn Ganeshen offered up a handful of modules and a couple mixins for testing wireless routers from Cambium Networks

3 min InsightVM

Vulnerability Management Year in Review, Part 1: Collect

Sometimes, it seems change is the only permanent thing in information security. To help deal with change on your terms, we set out to help maintain visibility to your environment as it is presented to you. How? By efficiently collecting vulnerability data at scale.

6 min Haxmas

HaXmas Review: A Year of Patch Tuesdays

Today’s installment of the 12 Days of HaXmas is about 2017’s 12 months of Patch Tuesdays . Never mind that there were only eleven months this year, thanks to Microsoft canceling most of February’s planned fixes. This coincided with when they’d planned to roll out their

7 min Haxmas

12 Memorable Metasploit Moments of 2017

This HaXmas, we delve into 12 Memorable Metasploit Moments from 2017 that inspired us, impressed us, and made us feel more connected to our global community of contributors, users, and friends.