Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Three Dimensions of the Threat Intelligence Scale Problem
Newest First  |  Oldest First  |  Threaded View
jonny312
jonny312,
User Rank: Apprentice
1/30/2020 | 3:39:43 AM
Re: Pending Review
The issue here is that firewalls give just constrained TI in view of execution constraints. As well as can be expected just handle a couple hundred thousand risk markers. This is predominated by the a huge number of malignant IPs and spaces that exist at some random minute. Read More.
robster312
robster312,
User Rank: Apprentice
1/30/2020 | 2:22:07 AM
Re: Useful Post
To succeed, associations must be enabled to lessen their assault surface and staff over-burden so they can get progressively out of their current firewall and danger knowledge ventures. 
annawoods
annawoods,
User Rank: Apprentice
1/20/2020 | 2:41:17 AM
Useful One
I am happy to discover much useful information in the posts, writing sequence is amazing
romandavis
romandavis,
User Rank: Apprentice
1/13/2020 | 4:48:56 AM
Re: Useful Post
All intelligence Engcies are working for the safety of their countries. We can not understand its intelligence way.

 

 
REISEN1955
REISEN1955,
User Rank: Ninja
1/10/2019 | 9:30:24 AM
Managed services
When I moved to Georgia in 2014, I abandoned my sole - owner practice of IT support for small businesses (good business too, and profitable).  Georgia moved me to contract work and eventually to a firm that has a dedicated Malware forensics dept.  Now this is good info for an expanded and re-activated independent business here - malware and analaysis for the smaller business.  They cannot afford nor really have access to protocols and data for this area ---- but they CAN through me.  My issue is to replicate the tools used here (Carbon Black among many others) for their shops and try to get the same results.  Not easy. 
ankie99
ankie99,
User Rank: Apprentice
1/10/2019 | 6:24:00 AM
Re: Useful Post
This is really amazing for everyone. Thnaks a lot 
David Powers
David Powers,
User Rank: Apprentice
10/24/2018 | 8:32:00 AM
Useful Post
It is an exciting article and you can get a lot of information by going through the article. The article talks about the three dimensions of the threat intelligence scale problem. The blog post mentions that threat intelligence (TI) and information sharing have turned out to be critical requirements for successful security operations and cyber defense. The article also raises a concern, as the use of TI becomes more pervasive, it's also become obvious that there is a multidimensional TI scale problem that needs to be addressed.

 

Thanks,

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1809
PUBLISHED: 2022-05-21
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
CVE-2022-31267
PUBLISHED: 2022-05-21
Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext '[email protected]\n\trole = "#admin"' value.
CVE-2022-31268
PUBLISHED: 2022-05-21
A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).
CVE-2022-31264
PUBLISHED: 2022-05-21
Solana solana_rbpf before 0.2.29 has an addition integer overflow via invalid ELF program headers. elf.rs has a panic via a malformed eBPF program.
CVE-2022-31259
PUBLISHED: 2022-05-21
The route lookup process in beego through 1.12.4 and 2.x through 2.0.2 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).