Threat Command
New
- Simplified Case Creation
Threat Command users with access to the Rapid7 Customer Support portal can now initiate a new support or intelligence case with the new “Customer Portal” button. Customers can choose the type of case to open or to view their open cases. - Automatic Alerts for Breach or Ransomware Leaks from Trusted Sources
Alerts for indication of a breach or ransomware leak are now generated quicker to reduce latency between data exposure in the wild and customer notification. These automated alerts are generated from a curated list of trusted sources. - Alerts for Lookalike Domains with Different TLD
Alerts will be generated for newly-registered domains that exactly match a Domains asset, but with a different TLD.
Example: If the Domains asset is abc.com, alerts will be triggered for newly-registered domains like abc.sg, abc.tk, or abc.pl.
This feature is only enabled for newly-registered domain assets.
Improved
ServiceNow SIR App | New Version (2.1.0)
New version (2.1.0) is available on the ServiceNow store:Added support for Utah and Vancouver releases
Updated Alert Attachment Support
Deprecated unused rolesAdded support for fetching updated alerts automatically
Minor bug fixes
Users can continue to leverage Rapid7 Threat Command for Security Incident Response and Threat Intelligence on newer ServiceNow releases.
Ransomware Alert Profiler Examples
Examples to trigger alerts for these common Alert Profiler uses were added to the online Help:- when a leak is published about a specific sector
- when a specific ransomware group publishes a leak
- when your assets are mentioned in any context (even if not deemed to be relevant)
Confidential Documents Degradation
In an effort to continue Rapid7’s focus and commitment to our customers, Threat Command is initiating a degradation plan for the Confidential Documents threats and alerts.- On November 6, 2023, threats and alerts will no longer be generated from VirusTotal input. Historical threats and alerts will be permanently deleted.
- Threats and alerts from Bing input will remain, and service will continue as-is.
Fixed
ID | Case | Area | Description |
---|---|---|---|
BS-3552 | - | Alerts | SSL threats and alerts are not generated. |
TIP
Improved
- IOC sources | ‘FireEye Intelligence’ Feed is Being Replaced by ‘Mandiant Intelligence’ feed
Mandiant has declared that v2 credentials for the ‘FireEye Intelligence’ feed will be EOL at the end of October 2023. At that time, the feed will be disabled. Users can now use the ‘Mandiant Intelligence’ feed with their v4 credentials instead of the ‘FireEye Intelligence’ feed. Until the end of October, both feeds will be visible in the UI.
Platform
Improved
- Alert Attributes Added to Policy Emails
Customers can incorporate the alert ID, severity, and source URL in emails triggered by a policy.
Incorporating these attributes into email subjects or descriptions gives more detailed notifications tailored to customer needs.