rapid7 

@rapid7@infosec.exchange
83 Followers
1 Following
5 Posts
Little bug, Big impact. 25k bounty - ProDefense

As an ethical hacker, I was on the hunt for vulnerabilities in a well-known company’s web application. I had scanned the code multiple times, but something just didn’t feel right. That’s when I…

ProDefense

Don't miss @CyberThreatAlliance's panel on February 16, where panelists from @rapid7, @sophos, Scitum, and Cyber Threat Alliance will discuss mandatory #cyber incident reporting.

Register: https://us06web.zoom.us/webinar/register/WN_LCQV9cKuTzmuA5ODKRryHg

For more on helping the victims of cyber attacks and enhancing complex technical information gathering, check out our proposed Cyber Incident Reporting Framework created with the Cyber Threat Alliance and other key partners: https://securityandtechnology.org/virtual-library/reports/cyber-incident-reporting-framework/

Welcome! You are invited to join a webinar: CTA Webinar - Mandatory Cyber Incident Reporting Requirements are Good for Business. After registering, you will receive a confirmation email about joining the webinar.

Many countries are implementing mandatory cyber incident reporting requirements, including the US, EU, Australia, and India. While the typical private sector instinct might be to oppose such rules, properly drafted reporting requirements will ultimately benefit the business community. Governments and cybersecurity providers can use the resulting information to provide tailored assistance, generate better warnings to similarly situated companies, understand the total burden cybercrime is placing on the economy, and determine whether policies are having their intended effects. Join Imelda Flores (Scitum), Joe Levy (Sophos), Raj Samani (Rapid7), and Michael Daniel (Cyber Threat Alliance) as we explore how to make mandatory cyber incident reporting work as intended.

Zoom

Patch or perish: Attackers are continuing to target out-of-date VMware systems to infect them with crypto-locking malware such as ESXiArgs and hold them to ransom. VMware warns that *multiple* long-patched flaws in ESXi may be getting exploited by #ransomware groups.
https://www.databreachtoday.com/ransomware-campaigns-compromise-more-vmware-esxi-hosts-a-21220

h/t @rapid7 @trellix @censysio #danielcard

Ransomware Campaigns Compromise More VMware ESXi Hosts

Attackers are continuing to target unpatched VMware hosts to infect them with ESXiArgs and RansomExx2 crypto-locking malware and hold them to ransom. VMware urges