Dispelling Zoom Bugbears: What You Need to Know About the Latest Zoom Vulnerabilities
In this blog, we break down what you need to know about the recent Zoom security issues and its vulnerability remediation process.…
Working from Home? Wi-Fi Security and Tips and Tricks
I jotted down some Wi-Fi security and management tips for my friends and colleagues who might not have paid much attention to their home networking.…
The Importance of Network Visibility With a Remote Workforce
As IT and network security staff around the world hurry to roll out more and more VPN and remote access services, it’s important to recognize that security or operational issues can arise.…
How to Maintain Your Cybersecurity Posture in Uncertain Times
In this blog, we will discuss some of the key areas a security leader can focus on to make sure your company and teams are prepared.…
How to WFH and Keep Your Digital Self Safe
In this blog, we discuss how to work from home (WFH) and keep your digital self safe.…
DOUBLEPULSAR over RDP: Baselining Badness on the Internet
How many internet-accessible RDP services have the DOPU implant installed? How much DOPU-over-RDP traffic do we see being sprayed across the internet?…
The Anatomy of RDP Exploits: Lessons Learned from BlueKeep and DejaBlue
In this blog, we discuss lessons learned from RDP exploits such as BlueKeep and DejaBlue, and how organizations can be protected form future vulnerabilities.…
Attack Surface Monitoring with Project Sonar
Attack Surface Monitoring with Project Sonar can help you reduce and monitor your attack surface.…
Microsoft Windows RDP Network Level Authentication Bypass (CVE-2019-9510): What You Need to Know
CERT/CC has released an advisory regarding discovered behavior in the Microsoft Windows Remote Desktop Protocol (RDP), which can allow an attacker to bypass the lock screen on some remote sessions.…
Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 2)
Rapid7's Insight agent can provide your organization with real-time, accurate results with the smallest possible footprint.…
Endpoint Agents Are Necessary for Today’s Modern Environment: Here’s Why (Part 1)
Endpoint agents can help you integrate your siloed vulnerability management and incident detection and response programs and implement SecOps practices.…
Vulnerability Management: Best Practices
We are often asked by customers for recommendations on what they should be scanning, when they should be scanning, how they ensure remote devices don't get missed, and in some cases why they need to scan their endpoints (especially when they have counter-measures in place…