Threat Intelligence
News & Commentary
Introducing ĎRITAí for Real Intelligence Threat Analysis
John Strand, SANS Senior Instructor & Owner, Black Hills Information SecurityCommentary
SANS' free, new framework can help teams hunt for attackers by extending traditional signature analysis to blacklisted IP addresses and accounts that have multiple concurrent logons to multiple systems.
By John Strand SANS Senior Instructor & Owner, Black Hills Information Security, 11/20/2015
Comment0 comments  |  Read  |  Post a Comment
US-China Security Review Commission Discusses 'Hack-Back' Laws
Dark Reading Staff, Quick Hits
Commission's annual report to Congress recommends a closer look at whether companies should be allowed to launch counterattacks on hackers.
By Dark Reading Staff , 11/19/2015
Comment1 Comment  |  Read  |  Post a Comment
IBM Report: Ransomware, Malicious Insiders On The Rise
Sara Peters, Senior Editor at Dark ReadingNews
X-Force's top four cyber threat trends also names upper management's increasing interest in infosec.
By Sara Peters Senior Editor at Dark Reading, 11/16/2015
Comment1 Comment  |  Read  |  Post a Comment
Donít Toy With The Dark Web, Harness It
James Chappell, CTO & Founder, Digital ShadowsCommentary
The Dark Webís sinister allure draws outsized attention, but time-strapped security teams would benefit from knowing what's already circulating in places they don't need Tor or I2P to find.
By James Chappell CTO & Founder, Digital Shadows, 11/16/2015
Comment2 comments  |  Read  |  Post a Comment
Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
Mike Paquette, VP Products, PrelertCommentary
Guided by an organization's internal security experts,'algorithmic assistants' provide a powerful new way to find anomalies and patterns for detecting cyberthreat activity.
By Mike Paquette VP Products, Prelert, 11/11/2015
Comment0 comments  |  Read  |  Post a Comment
Why Threat Intelligence Feels Like A Game Of Connect Four
Kristi Horton, Lead Intelligence Officer, Financial Services Information Sharing and Analysis Center (FS-ISAC)Commentary
In real life, solving the cybersecurity puzzle has many challenges. But shared wisdom and community defense models are making it easier to connect the dots.
By Kristi Horton Lead Intelligence Officer, Financial Services Information Sharing and Analysis Center (FS-ISAC), 11/10/2015
Comment2 comments  |  Read  |  Post a Comment
UK-US Cyberattack Simulation On Finance Sector Set For This Month
Sara Peters, Senior Editor at Dark ReadingNews
US-CERT and CERT-UK putting President and Prime Minister's earlier plans into action.
By Sara Peters Senior Editor at Dark Reading, 11/2/2015
Comment0 comments  |  Read  |  Post a Comment
Security Analytics Still Greenfield Opportunity
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Surveys out this week show improvement in the use of analytics and threat intelligence but room for better execution.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/29/2015
Comment0 comments  |  Read  |  Post a Comment
Machine Learning Is Cybersecurityís Latest Pipe Dream
Simon Crosby, Co-founder & CTO, BromiumCommentary
Rather than waste money on the unproven promises of ML and AI, invest in your experts, and in tools that enhance their ability to search for and identify components of a new attack.
By Simon Crosby Co-founder & CTO, Bromium, 10/29/2015
Comment4 comments  |  Read  |  Post a Comment
5 Things To Know About CISA
Sara Peters, Senior Editor at Dark ReadingNews
Despite criticism from privacy advocates, the Cybersecurity Information Sharing Act passed through the Senate yesterday.
By Sara Peters Senior Editor at Dark Reading, 10/28/2015
Comment8 comments  |  Read  |  Post a Comment
Passing the Sniff Test: Security Metrics and Measures
Ericka Chickowski, Contributing Writer, Dark Reading
Cigital dishes dirt on top security metrics that donít work well, why theyíre ineffective and which measurable to consider instead.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/23/2015
Comment2 comments  |  Read  |  Post a Comment
To Find The Needle, Chop Down the Haystack: 5 Steps For Effective Threat Monitoring
Jeff Schilling, Chief of Operations and Security, ArmorCommentary
Would bank security screen everyone entering the building then leave the vault door open with no one watching the money? Of course not!
By Jeff Schilling Chief of Operations and Security, Armor, 10/22/2015
Comment1 Comment  |  Read  |  Post a Comment
Likeliest Fraudsters Are, Or Claim To Be, 85-90 Years Old
Sara Peters, Senior Editor at Dark ReadingNews
New report paints a composite picture of the 'Fraudiest Person in America'
By Sara Peters Senior Editor at Dark Reading, 10/20/2015
Comment1 Comment  |  Read  |  Post a Comment
First Cyberterror Charges: DOJ Accuses Hacker Of Giving Military PII To ISIS
Sara Peters, Senior Editor at Dark ReadingQuick Hits
The data was first stolen from an online retailer, and the suspect is awaiting extradition hearing in Malaysia.
By Sara Peters Senior Editor at Dark Reading, 10/16/2015
Comment1 Comment  |  Read  |  Post a Comment
An Atypical Approach To DNS
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEyeCommentary
Itís now possible to architect network instrumentation to collect fewer data sources of higher value to security operations. Hereís how -- and why -- you should care.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 10/15/2015
Comment0 comments  |  Read  |  Post a Comment
Prolific Cybercrime Gang Favors Legit Login Credentials
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
FireEye researchers shed more light on infamous cybercriminals associated with RawPOS malware. and christen it 'FIN5.'
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/13/2015
Comment0 comments  |  Read  |  Post a Comment
Intro To Machine Learning & Cybersecurity: 5 Key Steps
Stephen Newman, CTO, DamballaCommentary
Software-based machine learning attempts to emulate the same process that the brain uses. Hereís how.
By Stephen Newman CTO, Damballa, 10/7/2015
Comment0 comments  |  Read  |  Post a Comment
Researchers Disrupt Angler Exploit Kit, Ransomware Operation
Sara Peters, Senior Editor at Dark ReadingNews
Cisco Talos Group estimates Angler is making $60 million per year from ransomware alone.
By Sara Peters Senior Editor at Dark Reading, 10/6/2015
Comment0 comments  |  Read  |  Post a Comment
Donít Be Fooled: In Cybersecurity Big Data Is Not The Goal
Jay Jacobs, Senior Data Scientist, BitSight TechnologiesCommentary
In other words, the skills to be a security expert do not translate to being able to understand and extract meaning from security data.
By Jay Jacobs Senior Data Scientist, BitSight Technologies, 10/6/2015
Comment0 comments  |  Read  |  Post a Comment
Automating Breach Detection For The Way Security Professionals Think
Giora Engel, VP Product & Strategy, LightCyberCommentary
The missing ingredient in making a real difference in the cumbersome process of evaluating a flood of alerts versus a small, actionable number is context.
By Giora Engel VP Product & Strategy, LightCyber, 10/1/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio