Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/26/2013
06:42 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mandiant Launches New Threat Intelligence Offering

Threat Intelligence provides customers with the analytical tools and contextual analysis to help customers better understand high priority threats

SAN FRANCISCO--(BUSINESS WIRE)--Mandiant, the leader in advanced threat detection and response solutions, today announced the launch of Mandiant Intelligence Center&trade, a new offering that enables security teams to access Mandiant's threat and malware intelligence. The Mandiant Intelligence Center provides customers with the analytical tools and contextual analysis to help customers better understand high priority threats so they can identify and stop attacks.

"Too often, when new threats emerge security teams are left to piece together disconnected fragments of intelligence and draw their own conclusions about what actions they should take," said Dan McWhorter, managing director of threat intelligence at Mandiant. "We created the Mandiant Intelligence Center as a resource for assessing threats and contextualizing them, so that users can access Mandiant's intelligence and expertise to help inform their response."

The Mandiant Intelligence Center draws on proprietary intelligence gathered from hundreds of thousands of hours on the front lines responding to large-scale intrusions by the most advanced threat groups. Subscribers will benefit from our unparalleled visibility into threats and gain access to the same intelligence database that Mandiant uses to respond and defend against the most advanced threat actors so they can better defend themselves and reduce the impact of compromises.

The Mandiant Intelligence Center provides:

Analysis of High-Profile Threats. Subscribers can access timely analysis of new high-profile threat events as they arise. Mandiant's intelligence analysts include an event synopsis along with context about the specific threat based on Mandiant's proprietary intelligence.

Automated Malware Analysis. Subscribers obtain detailed analysis and context for malware submitted via the Center. Analysis is provided by email and includes detailed static and dynamic analysis reporting, code base comparison of submitted malware, details on which major anti-virus vendors currently detect it, and information on Mandiant's familiarity with the malware, such as use by certain threat groups. The Center also provides a high-fidelity Indicator of Compromise (IOC) related to the malware.

Profiles of Advanced Threat Groups. Detailed profiles of advanced threat groups include their latest tactics, techniques and procedures (TTPs), plus analysis and insights into targeted industries and characteristics of the data pursued by each group.

Domain and IP Analysis. Subscribers can submit a domain or IP to the Center and receive information and detailed context from Mandiant's comprehensive intelligence database. Users learn whether Mandiant has linked it to known threat actors and when we most recently encountered it.

Trend Analysis. In-depth reports written by Mandiant intelligence analysts highlight emerging trends and analysis of ongoing changes in the threat landscape.

Safe File Download. Enter the URL of a suspected malicious file, and it will be downloaded to the Center and transmitted to you safely to avoid the risk of compromising your own devices or exposing your identity.

To learn more about this new offering stop by Mandiant's booth (#2439) at the RSA Conference, visit the www.mandian.com/products, or contact a sales representative. You can also view a report recently released by the Mandiant Intelligence Center entitled "APT1: Exposing One of China's Cyber Espionage Units" at www.mandiant.com/apt1.

About Mandiant

Mandiant is the leader in security incident response management. Headquartered in Alexandria, Virginia, with offices in New York, Los Angeles, San Francisco and Reston, Virginia, Mandiant provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and the world's leading law firms. The authors of 12 books and quoted frequently by leading media organizations, Mandiant security consultants and engineers hold top government security clearances and certifications and advanced degrees from some of the most prestigious computer science universities. To learn more about Mandiant visit www.mandiant.com, read the company blog, M-unition&trade http://blog.mandiant.com, follow on Twitter @Mandiant or Facebook at www.facebook.com/mandiantcorp.

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.iUQWirHB.dpuf

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14499
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.
CVE-2020-14501
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-306) issue. Successful exploitation of this vulnerability may allow an attacker to obtain the information of the user table, including the administrator credentials in plain text. An attacker may also ...
CVE-2020-14503
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.
CVE-2020-14497
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
CVE-2020-14505
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection�) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that create...