Threat Intelligence

9/11/2018
05:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ThreatConnect Now Integrates with Dragos Worldview Intelligence

Security teams can act efficiently to identify malicious actors targeting worldwide industrial networks

September 11, 2018 - Arlington, VA - ThreatConnect, Inc.®, provider of the industry's only extensible, intelligence-driven security platform, is proud to announce its integration with Dragos WorldView intelligence, which delivers critical insight about threat activity groups specifically targeting industry control networks (ICS) worldwide.

With this integration, ThreatConnect users have the ability to import Reports and Indicators, along with all of their context, from the Dragos WorldView API into ThreatConnect. Users gain the necessary information and relevance to identify malicious actors and activity targeting industrial control networks globally. This knowledge enables industrial control system (ICS) defenders to make tactical and strategic recommendations about their environments quickly and confidently.

ThreatConnect VP of Product Andy Pendergast said, "Malicious actors are increasingly targeting OT (operational technology) networks. With Dragos Worldview intelligence integrated into ThreatConnect, we can bridge the gap that these actors often exploit between the IT and OT networks. Security teams are able to keep situationally aware of threats relevant to them, alert on any related activity to these threats in their IT networks and act on them efficiently with any of our dozens of integrations into their standard security controls.”

For more information about ThreatConnect’s integration with Dragos WorldView, we invite you to join us for our upcoming webinar, The Diamond: An Analyst’s Best Friend on Tuesday, September 18th at 2:00pm EST. To register or for more information, please visit: https://go.threatconnect.com/diamond-model-webinar

 

About ThreatConnect

ThreatConnect Inc.®, the pioneer in threat intelligence platforms, arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry's only extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis, automation, and orchestration needs of security teams at any maturity level. More than 1,600 companies and agencies worldwide use the ThreatConnect platform to integrate their security technologies, teams, and processes with relevant threat intelligence resulting in reduced detection and response time for enhanced asset protection. To register for a free ThreatConnect account or learn more, visit: https://www.threatconnect.com/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19296
PUBLISHED: 2018-11-16
PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an object injection attack.
CVE-2018-19301
PUBLISHED: 2018-11-15
tp4a TELEPORT 3.1.0 allows XSS via the login page because a crafted username is mishandled when an administrator later views the system log.
CVE-2018-5407
PUBLISHED: 2018-11-15
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-14934
PUBLISHED: 2018-11-15
The Bluetooth subsystem on Polycom Trio devices with software before 5.5.4 has Incorrect Access Control. An attacker can connect without authentication and subsequently record audio from the device microphone.
CVE-2018-14935
PUBLISHED: 2018-11-15
The Web administration console on Polycom Trio devices with software before 5.5.4 has XSS.