Rumble Blog

April 8, 2022

Employee spotlight: Pearce Barry

Meet Pearce Barry, Principal Security Researcher “All employees are encouraged to be their authentic selves and they are given the freedom to lead by example. Everyone here, regardless of their title or position, is open to new ideas and feedback,” said Pearce …

Read More

April 5, 2022

Rumble 2.12: Generate organization reports, create scan templates, synchronize GCP, and invite external users

What’s new with Rumble 2.12? Generate Organization Overview Report for stakeholders Create scan templates to simplify scan management Synchronize your GCP virtual machines to Rumble Invite external Rumble users to your account Fingerprints and protocol updates User …

Read More

March 30, 2022

Finding Kaspersky AV on your Windows endpoints

Late last week, the U.S. Federal Communications Commission announced it had added Russian-based Kaspersky Lab to its Covered List, maintained by the FCC to identify “entities that pose an unacceptable risk to U.S. national security.” This follows a 2017 action by the U.S. …

Read More

March 25, 2022

Employee spotlight: Jess Maffetore

Meet Jess Maffetore, Director of Growth Marketing at Rumble Network Discovery “Don’t be afraid to fail. Not everything will be a slam dunk. If something doesn’t work, accept it and move on–try something else,” said Jess Maffetore, the Director of …

Read More

March 15, 2022

Finding Veeam Backup & Replication instances

Veeam recently published information on two vulnerabilities in the Veeam Backup & Replication product, originally reported by Nikita Petrov of Positive Technologies. Which versions are affected? These vulnerabilities affect Backup & Replication versions 9.5, 10, and …

Read More

March 10, 2022

Rumble and Noetic integrate to automate workflows that solve coverage gaps

Lack of visibility, correlation, and automation are major hurdles impeding security vulnerability identification and mitigation. Existing tooling often imprecisely fingerprints anything but common devices like standard-issue workstations. Some tools miss unmanaged and …

Read More

March 9, 2022

Finding APC assets vulnerable to TLStorm

Researchers at Armis recently published details on three new vulnerabilities affecting cloud-connected APC Smart-UPS devices manufactured by Schneider Electric. Dubbed “TLStorm”, two of these vulnerabilities exist in the firmware TLS implementation, while the …

Read More

March 8, 2022

Rumble 2.11: Identify outliers, trace network paths, and streamline SSO user provisioning

What’s new with Rumble 2.11? Identify outliers to find misconfigurations, missing patches, and rogue devices Trace potential network paths to verify network segmentation Streamline SSO user provisioning Cloud connectors available in Rumble Professional Identify …

Read More

February 28, 2022

Finding GitLab instances

The development team at GitLab issued a new critical security release that patches seven recently-disclosed vulnerabilities in GitLab software. Reported by customers, security researchers, and GitLab team members, these vulnerabilities are located in various components of …

Read More

February 18, 2022

Finding Zabbix instances

Popular monitoring tool Zabbix surfaced in security news this week due to two newly disclosed vulnerabilities. Discovered by researchers at SonarSource, successful exploitation of vulnerable Zabbix Frontend targets could allow authentication bypass, configuration changes, …

Read More

Subscribe to receive email blog updates

We won't share your email. Unsubscribe at any time.