Comments
AT&T to Buy AlienVault
Newest First  |  Oldest First  |  Threaded View
No SOPA
100%
0%
No SOPA,
User Rank: Ninja
7/10/2018 | 8:47:22 PM
Concern With Cybersecurity Acquisitions by Telecoms & ISPs
For months we've been seeing a flurry of cybersecurity sector acquisitions by big money, from ISP management companies to heavy hitter telecoms. I get it - ISP, wireless and cellular service providers are getting hit hard and the key to customers continuing with their current providers - and especially new users signing on - is a sense of security, improved and guaranteed. But this one gives me pause.

AlienVault are the folks behind Open Threat Exchange (OTX). It's one of the coolest communities out there based around threat data sharing and discussion. I jumped on board as soon as I had the opportunity. Part of what made this possible was AlienVault's then independent status, and later collaboration with Intel and HP brought valuable realtime data into the mix. What if AT&T had acquired AlienVault in 2011? Would OTX have even been released, or would it have carried a hefty subscription fee?

I worry acquisition of forward-thinking cybersecurity firms like AlienVault could have a negative impact on projects like OTX. While not the same setup as AlienVault, I can't imagine what would become of RedTeam Security, for example, if Verizon were to acquire them. I hate to see my favorite cyber warriors getting snatched up, but out of respect for their founders I also wish them the best. We wouldn't be where we are today without them.


New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17208
PUBLISHED: 2018-09-19
Linksys Velop 1.1.2.187020 devices allow unauthenticated command injection, providing an attacker with full root access, via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi (scripts that can be discovered with binwalk on the firmware, but are not visible in the web interface). This occurs because shell me...
CVE-2018-17205
PUBLISHED: 2018-09-19
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not ex...
CVE-2018-17206
PUBLISHED: 2018-09-19
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
CVE-2018-17207
PUBLISHED: 2018-09-19
An issue was discovered in Snap Creek Duplicator before 1.2.42. By accessing leftover installer files (installer.php and installer-backup.php), an attacker can inject PHP code into wp-config.php during the database setup step, achieving arbitrary code execution.
CVE-2017-2855
PUBLISHED: 2018-09-19
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HT...