Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Creating And Maintaining A Custom Threat Profile
Newest First  |  Oldest First  |  Threaded View
sspinola21ct
50%
50%
sspinola21ct,
User Rank: Apprentice
10/16/2013 | 7:09:17 PM
re: Creating And Maintaining A Custom Threat Profile
Great article John. Of course, threat feeds cost money, and gaining relevant and actionable intelligence from them is difficult and time-consuming (for the reasons you state and more) so security teams have a hard time proving their value as it is. Customized feeds will cost even more, so pitching management on them may be a hard sell. One way to gain additional value from the feeds you already have is to combine them with other data you already collect (such as NetFlow and HTTP metadata) to see not only connections to known bad IP addresses identified in the feeds, but also the before, the after, and any contextual behaviors that ultimately show you information well beyond the original threat feed. This approach reduces time-to-detection and remediation (and thus increases the business value of the feeds). That could provide the ammunition an organizations needs to encourage management to "upgrade" to more customized feeds.
anon6368133649
50%
50%
anon6368133649,
User Rank: Apprentice
10/10/2013 | 4:12:33 PM
re: Creating And Maintaining A Custom Threat Profile
Thanks for the great read! However, the link to the free report seems incomplete.


HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8142
PUBLISHED: 2020-04-03
A security restriction bypass vulnerability has been discovered in Revive Adserver version < 5.0.5 by HackerOne user hoangn144. Revive Adserver, like many other applications, requires the logged in user to type the current password in order to change the e-mail address or the password. It was how...
CVE-2020-8143
PUBLISHED: 2020-04-03
An Open Redirect vulnerability was discovered in Revive Adserver version < 5.0.5 and reported by HackerOne user hoangn144. A remote attacker could trick logged-in users to open a specifically crafted link and have them redirected to any destination.The CSRF protection of the “/...
CVE-2020-8147
PUBLISHED: 2020-04-03
Flaw in input validation in npm package utils-extend version 1.0.8 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using utils-extend.
CVE-2020-6994
PUBLISHED: 2020-04-03
A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP requests to overflow an internal buffer. The followi...
CVE-2020-8637
PUBLISHED: 2020-04-03
A SQL injection vulnerability in TestLink 1.9.20 allows attackers to execute arbitrary SQL commands in dragdroptreenodes.php via the node_id parameter.