Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Next-Generation Malware: Changing The Game In Security's Operations Center
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
10/18/2012 | 11:08:06 PM
re: Next-Generation Malware: Changing The Game In Security's Operations Center
Security collaboration is key here. While there may be a shortage of skilled malware analysts, itGs not hard to conceive how a small number of professionals analyzing large sets of data from various organizations is much more-efficient-than individuals analyzing data from just one organization.

Seculert Sense analyzes data from customer log files and outbound intelligence collected from live botnets, over time digesting these huge amounts of data in order to identify persistent attacks. Whenever we identify malicious activity in any given log source, we are automatically able to detect similar activities in other sources, even if the logs originate from different vendor products. This enables discovery of targeted attacks across distributed enterprise environments, or even across multiple organizations and industries.

Cyberattacks don't target just one entity and we are all part of interconnected systems and should collaborate as such.

Dudi Matot

User Rank: Apprentice
10/15/2012 | 6:26:40 PM
re: Next-Generation Malware: Changing The Game In Security's Operations Center
The current phenomenon or continuum (don't think its done...) creates required, say 'mandatory' co-operation bodies between organizations to protect their assets against adversaries. The concept however is actually quite similar that the adversaries or criminals have used already for ages.

They have executed it with a loose-coupled co-operation between organizations or individuals and then gain and capability through speed and by success may have been much greater than anticipated, or co-op was even required to get the job done. There is not much difference here actually.

"And what does our studio audience say...please vote now!"

So the game will be in constant change and unfortunately - on the fortifiers cost. I believe that somewhat "next thing" we are going to see will be "shadows" within the co-operation to paralyzing the common tactics, techniques and procedures brought together by organizations.

I am not talking drive-by-DDoS:n, I am talking here directed ammunition against defensing capabilities built by organizations together, using their own juice to say.

It sounds, and moreover it feels more tactically oriented approach to me. That is something there is a need also in the side of 'good guys'; solid tactics, solid manuevers and models HOW TO exchange information without compromising the whole thing, not just one organization.

Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...
PUBLISHED: 2021-06-14
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the...