Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/26/2013
06:42 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mandiant Launches New Threat Intelligence Offering

Threat Intelligence provides customers with the analytical tools and contextual analysis to help customers better understand high priority threats

SAN FRANCISCO--(BUSINESS WIRE)--Mandiant, the leader in advanced threat detection and response solutions, today announced the launch of Mandiant Intelligence Center&trade, a new offering that enables security teams to access Mandiant's threat and malware intelligence. The Mandiant Intelligence Center provides customers with the analytical tools and contextual analysis to help customers better understand high priority threats so they can identify and stop attacks.

"Too often, when new threats emerge security teams are left to piece together disconnected fragments of intelligence and draw their own conclusions about what actions they should take," said Dan McWhorter, managing director of threat intelligence at Mandiant. "We created the Mandiant Intelligence Center as a resource for assessing threats and contextualizing them, so that users can access Mandiant's intelligence and expertise to help inform their response."

The Mandiant Intelligence Center draws on proprietary intelligence gathered from hundreds of thousands of hours on the front lines responding to large-scale intrusions by the most advanced threat groups. Subscribers will benefit from our unparalleled visibility into threats and gain access to the same intelligence database that Mandiant uses to respond and defend against the most advanced threat actors so they can better defend themselves and reduce the impact of compromises.

The Mandiant Intelligence Center provides:

Analysis of High-Profile Threats. Subscribers can access timely analysis of new high-profile threat events as they arise. Mandiant's intelligence analysts include an event synopsis along with context about the specific threat based on Mandiant's proprietary intelligence.

Automated Malware Analysis. Subscribers obtain detailed analysis and context for malware submitted via the Center. Analysis is provided by email and includes detailed static and dynamic analysis reporting, code base comparison of submitted malware, details on which major anti-virus vendors currently detect it, and information on Mandiant's familiarity with the malware, such as use by certain threat groups. The Center also provides a high-fidelity Indicator of Compromise (IOC) related to the malware.

Profiles of Advanced Threat Groups. Detailed profiles of advanced threat groups include their latest tactics, techniques and procedures (TTPs), plus analysis and insights into targeted industries and characteristics of the data pursued by each group.

Domain and IP Analysis. Subscribers can submit a domain or IP to the Center and receive information and detailed context from Mandiant's comprehensive intelligence database. Users learn whether Mandiant has linked it to known threat actors and when we most recently encountered it.

Trend Analysis. In-depth reports written by Mandiant intelligence analysts highlight emerging trends and analysis of ongoing changes in the threat landscape.

Safe File Download. Enter the URL of a suspected malicious file, and it will be downloaded to the Center and transmitted to you safely to avoid the risk of compromising your own devices or exposing your identity.

To learn more about this new offering stop by Mandiant's booth (#2439) at the RSA Conference, visit the www.mandian.com/products, or contact a sales representative. You can also view a report recently released by the Mandiant Intelligence Center entitled "APT1: Exposing One of China's Cyber Espionage Units" at www.mandiant.com/apt1.

About Mandiant

Mandiant is the leader in security incident response management. Headquartered in Alexandria, Virginia, with offices in New York, Los Angeles, San Francisco and Reston, Virginia, Mandiant provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and the world's leading law firms. The authors of 12 books and quoted frequently by leading media organizations, Mandiant security consultants and engineers hold top government security clearances and certifications and advanced degrees from some of the most prestigious computer science universities. To learn more about Mandiant visit www.mandiant.com, read the company blog, M-unition&trade http://blog.mandiant.com, follow on Twitter @Mandiant or Facebook at www.facebook.com/mandiantcorp.

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.iUQWirHB.dpuf

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
CVE-2011-1930
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
CVE-2011-1145
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
CVE-2011-1488
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...