Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Three Dimensions of the Threat Intelligence Scale Problem
Oldest First  |  Newest First  |  Threaded View
David Powers
David Powers,
User Rank: Apprentice
10/24/2018 | 8:32:00 AM
Useful Post
It is an exciting article and you can get a lot of information by going through the article. The article talks about the three dimensions of the threat intelligence scale problem. The blog post mentions that threat intelligence (TI) and information sharing have turned out to be critical requirements for successful security operations and cyber defense. The article also raises a concern, as the use of TI becomes more pervasive, it's also become obvious that there is a multidimensional TI scale problem that needs to be addressed.

 

Thanks,

 
ankie99
ankie99,
User Rank: Apprentice
1/10/2019 | 6:24:00 AM
Re: Useful Post
This is really amazing for everyone. Thnaks a lot 
REISEN1955
REISEN1955,
User Rank: Ninja
1/10/2019 | 9:30:24 AM
Managed services
When I moved to Georgia in 2014, I abandoned my sole - owner practice of IT support for small businesses (good business too, and profitable).  Georgia moved me to contract work and eventually to a firm that has a dedicated Malware forensics dept.  Now this is good info for an expanded and re-activated independent business here - malware and analaysis for the smaller business.  They cannot afford nor really have access to protocols and data for this area ---- but they CAN through me.  My issue is to replicate the tools used here (Carbon Black among many others) for their shops and try to get the same results.  Not easy. 
romandavis
romandavis,
User Rank: Apprentice
1/13/2020 | 4:48:56 AM
Re: Useful Post
All intelligence Engcies are working for the safety of their countries. We can not understand its intelligence way.

 

 
annawoods
annawoods,
User Rank: Apprentice
1/20/2020 | 2:41:17 AM
Useful One
I am happy to discover much useful information in the posts, writing sequence is amazing
robster312
robster312,
User Rank: Apprentice
1/30/2020 | 2:22:07 AM
Re: Useful Post
To succeed, associations must be enabled to lessen their assault surface and staff over-burden so they can get progressively out of their current firewall and danger knowledge ventures. 
jonny312
jonny312,
User Rank: Apprentice
1/30/2020 | 3:39:43 AM
Re: Pending Review
The issue here is that firewalls give just constrained TI in view of execution constraints. As well as can be expected just handle a couple hundred thousand risk markers. This is predominated by the a huge number of malignant IPs and spaces that exist at some random minute. Read More.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1399
PUBLISHED: 2022-08-17
An Argument Injection or Modification vulnerability in the "Change Secret" username field as used in the Discovery component of Device42 CMDB allows a local attacker to run arbitrary code on the appliance with root privileges. This issue affects: Device42 CMDB version 18.01.00 and prior ve...
CVE-2022-1400
PUBLISHED: 2022-08-17
Use of Hard-coded Cryptographic Key vulnerability in the WebReportsApi.dll of Exago Web Reports, as used in the Device42 Asset Management Appliance, allows an attacker to leak session IDs and elevate privileges. This issue affects: Device42 CMDB versions prior to 18.01.00.
CVE-2022-1401
PUBLISHED: 2022-08-17
Improper Access Control vulnerability in the /Exago/WrImageResource.adx route as used in Device42 Asset Management Appliance allows an unauthenticated attacker to read sensitive server files with root permissions. This issue affects: Device42 CMDB versions prior to 18.01.00.
CVE-2022-1410
PUBLISHED: 2022-08-17
OS Command Injection vulnerability in the db_optimize component of Device42 Asset Management Appliance allows an authenticated attacker to execute remote code on the device. This issue affects: Device42 CMDB version 18.01.00 and prior versions.
CVE-2021-42052
PUBLISHED: 2022-08-16
IPESA e-Flow 3.3.6 allows path traversal for reading any file within the web root directory via the lib/js/build/STEResource.res path and the R query parameter.