Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Next-Generation Malware: Changing The Game In Security's Operations Center
Newest First  |  Oldest First  |  Threaded View
D.Matot
50%
50%
D.Matot,
User Rank: Apprentice
10/18/2012 | 11:08:06 PM
re: Next-Generation Malware: Changing The Game In Security's Operations Center
Security collaboration is key here. While there may be a shortage of skilled malware analysts, itGs not hard to conceive how a small number of professionals analyzing large sets of data from various organizations is much more-efficient-than individuals analyzing data from just one organization.

Seculert Sense analyzes data from customer log files and outbound intelligence collected from live botnets, over time digesting these huge amounts of data in order to identify persistent attacks. Whenever we identify malicious activity in any given log source, we are automatically able to detect similar activities in other sources, even if the logs originate from different vendor products. This enables discovery of targeted attacks across distributed enterprise environments, or even across multiple organizations and industries.

Cyberattacks don't target just one entity and we are all part of interconnected systems and should collaborate as such.

Dudi Matot

http://www.seculert.com/sense....
mikk0j
50%
50%
mikk0j,
User Rank: Apprentice
10/15/2012 | 6:26:40 PM
re: Next-Generation Malware: Changing The Game In Security's Operations Center
The current phenomenon or continuum (don't think its done...) creates required, say 'mandatory' co-operation bodies between organizations to protect their assets against adversaries. The concept however is actually quite similar that the adversaries or criminals have used already for ages.

They have executed it with a loose-coupled co-operation between organizations or individuals and then gain and capability through speed and by success may have been much greater than anticipated, or co-op was even required to get the job done. There is not much difference here actually.

"And what does our studio audience say...please vote now!"

So the game will be in constant change and unfortunately - on the fortifiers cost. I believe that somewhat "next thing" we are going to see will be "shadows" within the co-operation to paralyzing the common tactics, techniques and procedures brought together by organizations.

I am not talking drive-by-DDoS:n, I am talking here directed ammunition against defensing capabilities built by organizations together, using their own juice to say.

It sounds, and moreover it feels more tactically oriented approach to me. That is something there is a need also in the side of 'good guys'; solid tactics, solid manuevers and models HOW TO exchange information without compromising the whole thing, not just one organization.


Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18654
PUBLISHED: 2021-06-22
Cross Site Scripting (XSS) in Wuzhi CMS v4.1.0 allows remote attackers to execute arbitrary code via the "Title" parameter in the component "/coreframe/app/guestbook/myissue.php".
CVE-2020-22168
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\change-emaild.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22169
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\appointment-history.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22170
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\get_doctor.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22171
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\registration.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.