Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Rapid7 Expands Integration Between Metasploit and Nexpose

On Tuesday, Boston-based Rapid7 announced that they have introduced the means to increase vulnerability management efficiency by offering tighter integration between Nexpose and Metasploit.

On Tuesday, Boston-based Rapid7 announced that they have introduced the means to increase vulnerability management efficiency by offering tighter integration between Nexpose and Metasploit.

The tie-in of the two products enables security teams to locate issues, prove they are exploitable and prioritize them, mitigate them, and then track the effectiveness of the mitigation itself. This process is important, Rapid7 explains, because while a given vulnerability may be a large problem for an organization, the same vulnerability could be no problem at all to a different organization; even if they are in the same market space.

Rapid7According to the release notes, the latest integrations between Nexpose and Metasploit Pro offer security teams the ability to import vulnerability scans; automatically validate the exploitability of a given high-risk vulnerability; spot-check individual vulnerabilities; push granular exploit results back to Nexpose via Vulnerability Exceptions; push device classifications back to Nexpose Asset Groups via Metasploit Tags; and monitor all of this with enhanced reports that are augmented with Nexpose data.

“Security professionals face a huge and complex challenge and they need to know that they are focusing their efforts on the highest risk vulnerabilities,” said HD Moore, CSO of Rapid7 and chief architect of the Metasploit Project.

“With Metasploit and Nexpose, security professionals can identify which of the numerous potential vulnerabilities are real in-roads for an attacker and prioritize these for remediation, making a more meaningful improvement to the organization’s security posture,” he added.

Metasploit version 4.4 is available now.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet