|By Business Wire||
|August 13, 2014 11:00 AM EDT||
Rapid7, a leading provider of security analytics software and services, today announced enhancements to Rapid7 Metasploit Pro and Rapid7 UserInsight to help security professionals detect and investigate compromised user credentials, the number one attack vector on computer systems. Exploiting user credentials to get a foothold in an organization and then move laterally across the network has become increasingly popular among attackers and is very hard to detect. Attackers harvest usernames and passwords through simple guessing, phishing, or by reusing credentials from public password leaks. Metasploit Pro now enables organizations to simulate attacks where credentials are compromised, to efficiently assess security risks, while UserInsight introduces a number of new capabilities for detecting and investigating suspicious user behavior.
“Our latest innovations leverage our deep understanding of the attacker mindset – combining insight from the Metasploit community, Rapid7 Labs research, and our services teams – to enable our customers to detect and contain security incidents quickly and effectively,” said Lee Weiner, senior vice president of products and engineering at Rapid7. “The 2014 Verizon Data Breach Investigations Report identified stolen credentials as the most common attack methodology; it’s critical that our customers are able to detect and respond to this kind of activity rapidly.”
Metasploit introduces simple management and reuse of credentials for penetration tests
Mirroring the increased use of stolen credentials by attackers, 59% of penetration testers focus more than half of their security assessments on credentials versus exploits, according to a 2014 survey1. Penetration testers typically use stolen credentials to compromise machines that in turn contain new credentials, repeating the process until they have extracted key data from the network. The biggest challenge of simulating these attacks often rests in effectively managing the large number of passwords, hashes, and SSH keys.
Metasploit Pro 4.10 increases productivity for penetration testers who leverage credentials to compromise large networks. It keeps track of credentials, including where they were gathered and which systems were compromised. The new features simplify and automate the reuse of credentials, and leverage them to gather more. This exploits the facts that users rarely use unique passwords per application, and that passwords are cached on the systems they use.
Metasploit Pro 4.10 is available immediately. For a free trial, please
UserInsight helps quickly detect and investigate attacks using stolen user credentials
Most organizations have no way to distinguish an authorized user from a malicious attacker using stolen credentials, leaving the entire organization vulnerable to today’s primary attack vector. Rapid7 UserInsight addresses this growing exposure by providing the ability for a security team to detect and investigate breaches and compromised user credentials across the organization. UserInsight integrates and correlates data from numerous native security event sources and other monitoring tools to recognize and prioritize attacks that would previously have escaped detection. Only UserInsight can combine context from users, end points, and cloud services with advanced detection techniques, such as honeypots, to help security teams respond to these types of attacks.
New updates to UserInsight include:
- Agentless monitoring of endpoint activity: Detecting credential-based attacks requires endpoint monitoring, which traditionally requires deploying an agent to each system. UserInsight now detects attacks that can only be seen by monitoring endpoints such as lateral movement and privilege escalation. This is accomplished without an agent, so administrators do not need to deploy or manage software clients. This capability also enables customers to discover malware by reviewing rare and unique processes.
- Spot malicious network scans: Once attackers gain access to the environment, for example by using credentials, they need to map out the network and identify potential targets. Honeypots can detect and alert on these types of scans, but security professionals often find them hard to deploy and maintain. UserInsight can now automatically deploy and maintain honeypots, making it quick and easy to spot attackers planning their next move.
- Visually follow attackers’ footsteps: Once an intruder has been identified, it is important to trace their footsteps through the network to identify which assets and users may have been compromised. UserInsight’s new User Graph enables visual tracking of users accessing assets and automatically highlights attempts to access critical assets or elevate privileges. Armed with this information, teams can accelerate incident response and identify other users who may have been involved.
UserInsight is available immediately. For more information and for a
free trial, please visit:
About Rapid7 Metasploit
Knowing your opponents' moves helps you better prepare your defenses. Metasploit, backed by a community of 200,000 open-source users and contributors, gives you that insight. It's the most popular penetration testing solution on the planet. With an average of 1.2 exploits added each day, Metasploit allows you to find your weaknesses before a malicious attacker does. Rapid7 Metasploit Pro is the only solution that increases productivity of penetration testers by automating repetitive and time-consuming tasks, easily simulating advanced attacks through evading defensive solutions, and producing one-click reports that would otherwise take days to pull together. It also helps prioritize and demonstrate risk through closed-loop vulnerability validation, and measure security awareness through simulated phishing emails. Integration with Rapid7 Nexpose validates vulnerabilities in your environment, demonstrates risk, and prioritizes action plans. End-to-end phishing campaigns allow you to safely test user behavior with analytics to tell you who fell for the bait. Plus, you can view campaign results in Rapid7 UserInsight for a more complete view of user risk.
About Rapid7 UserInsight
Rapid7 UserInsight helps security professionals quickly and easily detect and investigate incidents. Only UserInsight can combine context from users, endpoints, mobile, and cloud services with advanced detection techniques, such as honeypots, to help security teams respond to these types of attacks. UserInsight works by automatically detecting breaches and lateral movement inside the network perimeter. By creating a baseline of “typical” behavior for each user, UserInsight can identify unusual or suspicious behavior. This enables it to detect user account compromises with high accuracy and adds needed user context to any investigation. When a compromise is detected, UserInsight simplifies incident investigation because of its unique capability to easily show the relationship between incidents, users and assets. Security teams get a comprehensive view into user activity before and after any possible incident without the need to manually correlate logs. Incident responders can quickly identify other users who may have been impacted by the same attack.
Rapid7's IT security data and analytics solutions collect, contextualize and analyze the security data you need to fight an increasingly deceptive and pervasive adversary. Unlike traditional vulnerability assessment or incident management, Rapid7 solutions uniquely provide insight into the security state of your assets and users across virtual, mobile, private and public cloud networks. They enable you to fully manage your risk, simplify compliance, and identify, investigate and stop threats faster. Our threat intelligence, informed by members of the Metasploit open source community and the industry-leading Rapid7 Labs, provides relevant context, real-time updates and prioritized risk. Our solutions are used by more than 25% of the Fortune 1000 and nearly 3,000 enterprise, government and small business organizations across 78 countries. To learn more about Rapid7 or get involved in our threat research, visit www.rapid7.com.
1 2014 Metasploit User Survey of 561 security professionals that regularly use Metasploit as part of their job.
Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc. In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, will discuss how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting – a sustainable solution for the data required to manage I...
Oct. 4, 2015 12:00 AM EDT Reads: 364
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud without worrying about any lock-in fears. In fact by having standard APIs for IaaS would help PaaS expl...
Oct. 3, 2015 09:00 PM EDT Reads: 344
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user experience, both offline and online. The focus of this talk will be on IBM Cloudant, Apa...
Oct. 3, 2015 05:00 PM EDT Reads: 315
SYS-CON Events announced today that Cloud Raxak has been named “Media & Session Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Raxak Protect automates security compliance across private and public clouds. Using the SaaS tool or managed service, developers can deploy cloud apps quickly, cost-effectively, and without error.
Oct. 3, 2015 01:15 PM EDT Reads: 559
SYS-CON Events announced today that ProfitBricks, the provider of painless cloud infrastructure, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the cloud and the best price/performance value available. ProfitBricks was named one of the coolest Clo...
Oct. 3, 2015 01:00 PM EDT Reads: 641
Mobile messaging has been a popular communication channel for more than 20 years. Finnish engineer Matti Makkonen invented the idea for SMS (Short Message Service) in 1984, making his vision a reality on December 3, 1992 by sending the first message ("Happy Christmas") from a PC to a cell phone. Since then, the technology has evolved immensely, from both a technology standpoint, and in our everyday uses for it. Originally used for person-to-person (P2P) communication, i.e., Sally sends a text message to Betty – mobile messaging now offers tremendous value to businesses for customer and empl...
Oct. 3, 2015 12:00 PM EDT Reads: 135
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
Oct. 3, 2015 12:00 PM EDT Reads: 410
Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities. In his session at @ThingsExpo, Michael Heydt, founder of Seamless Thingies, will discuss and demonstrate how devices and humans can be integrated from a simple clust...
Oct. 3, 2015 11:00 AM EDT Reads: 580
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity. Should we federate, or not? How should identity be secured? Who owns the identity? How is identity ...
Oct. 3, 2015 11:00 AM EDT Reads: 388
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Oct. 3, 2015 09:45 AM EDT Reads: 309
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Oct. 3, 2015 09:00 AM EDT Reads: 487
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
Oct. 3, 2015 04:00 AM EDT Reads: 282
As enterprises capture more and more data of all types – structured, semi-structured, and unstructured – data discovery requirements for business intelligence (BI), Big Data, and predictive analytics initiatives grow more complex. A company’s ability to become data-driven and compete on analytics depends on the speed with which it can provision their analytics applications with all relevant information. The task of finding data has traditionally resided with IT, but now organizations increasingly turn towards data source discovery tools to find the right data, in context, for business users, d...
Oct. 3, 2015 04:00 AM EDT Reads: 304
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobile software company with over 150 developers, designers, quality assurance engineers, project manage...
Oct. 3, 2015 03:00 AM EDT Reads: 634
“The Internet of Things transforms the way organizations leverage machine data and gain insights from it,” noted Splunk’s CTO Snehal Antani, as Splunk announced accelerated momentum in Industrial Data and the IoT. The trend is driven by Splunk’s continued investment in its products and partner ecosystem as well as the creativity of customers and the flexibility to deploy Splunk IoT solutions as software, cloud services or in a hybrid environment. Customers are using Splunk® solutions to collect and correlate data from control systems, sensors, mobile devices and IT systems for a variety of Ind...
Oct. 3, 2015 02:00 AM EDT Reads: 532
SYS-CON Events announced today that Solgeniakhela will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Solgeniakhela is the global market leader in Cloud Collaboration and Cloud Infrastructure software solutions. Designed to “Bridge the Gap” between Personal and Professional Social, Mobile and Cloud user experiences, our solutions help large and medium-sized organizations dramatically improve productivity, reduce collaboration costs, and increase the overall enterprise value by bringing ...
Oct. 2, 2015 10:00 PM EDT Reads: 529
Sensors and effectors of IoT are solving problems in new ways, but small businesses have been slow to join the quantified world. They’ll need information from IoT using applications as varied as the businesses themselves. In his session at @ThingsExpo, Roger Meike, Distinguished Engineer, Director of Technology Innovation at Intuit, will show how IoT manufacturers can use open standards, public APIs and custom apps to enable the Quantified Small Business. He will use a Raspberry Pi to connect sensors to web services, and cloud integration to connect accounting and data, providing a Bluetooth...
Oct. 2, 2015 03:30 PM EDT Reads: 303
SYS-CON Events announced today that Micron Technology, Inc., a global leader in advanced semiconductor systems, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Micron’s broad portfolio of high-performance memory technologies – including DRAM, NAND and NOR Flash – is the basis for solid state drives, modules, multichip packages and other system solutions. Backed by more than 35 years of technology leadership, Micron's memory solutions enable the world's most innovative computing, consumer,...
Oct. 2, 2015 07:00 AM EDT Reads: 550
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Oct. 1, 2015 02:30 PM EDT Reads: 392
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
Oct. 1, 2015 06:00 AM EDT Reads: 7,342