Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

2/25/2020
01:30 PM
50%
50%

Google Adds More Security Features Via Chronicle Division

Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform.

RSA CONFERENCE 2020 - San Francisco - Chronicle — the once spun-off, now reabsorbed cybersecurity division of Google Cloud — launched a handful of new features at the RSA Conference, which kicked off in San Francisco this week.

The company plans to demonstrate how its cloud-based threat intelligence service, Backstory, can detect threats and analyze them as part of a timeline, show the tool's integrated fraud prevention services, and reveal new integrations with partners' products, such as Palo Alto Networks' Cortex XSOAR. As part of its rollout at RSA this year, Google Cloud will show how the platform can be used to investigate alerts and detect threats using the YARA-L, a language for describing behaviors and characteristics of cybersecurity threats focused on log files.

"Chronicle launched its security analytics platform in 2019 to help change the way any business could quickly, efficiently, and affordably investigate alerts and threats in their organization,"  said Sunil Potti, vice president of Google Cloud Security, in a blog post announcing the new features. "This advanced threat detection provides massively scalable, real-time and retroactive rule execution."

The latest additions to the software comes as the company is under scrutiny for what many critics see as a failed spinoff. 

In January 2018, Alphabet — Google's parent company — created Chronicle, with startup CEO Stephen Gillett calling the cybersecurity spinoff an "independent business" in a blog post announcing the launch of the firm. The company included VirusTotal, a virus detection service that submits a file to a variety of malware scanners, and a new cybersecurity analytics platform. At last year's RSA, 14 months after the company came out of stealth, it launched Backstory, a cloud-based service to bring varied threat intelligence together to give security teams context regarding threats facing their business.

"The missing piece is a powerful investigation, analytics, and hunting system to tie together a customer's internal network activity, external threat intelligence, and curated internal threat signals," the company stated at the time. "Such a system would give analysts the context they need to protect their organizations... [that is,] the backstory."

Last summer, however, Google reabsorbed Chronicle back into its Google Cloud business, potentially reducing the independent threat platform into a service offering on the Google Cloud Platform (GCP). "Chronicle's products and engineering team complement what Google Cloud offers," the company said at the time.

Yet the company continues to add partners and new features. 

Palo Alto Networks, for example, posed two scenarios that would benefit from Chronicle's Backstory. First, companies can automate the combining of threat intelligence information and network data to identify threats and then respond through a security orchestration, analysis, and response (SOAR) platform. Second, the Backstory platform can be used to help interactive, real-time investigations.

Such platforms help reduce the amount of time analysts are swapping between different dashboards on different products, the company said in a statement.

The YARA-L is a modified version of YARA, a rule-based approach to describing malware and threats originally developed by a founder of VirusTotal, an antimalware engine survey platform that was later bought by Google. 

"The two capabilities work together so that customers can create powerful detection rules against intelligent, auto-enriched and structured telemetry," Chronicle stated in a second blog post. "We make this available in our UI as well as through a new API that other security vendors can use to enhance their own products."

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps."

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/27/2020 | 4:00:02 PM
Time
Such platforms help reduce the amount of time analysts are swapping between different dashboards on different products, the company said in a statement. This would be biggest impact, if information is gathered and available to analysts to check then that would save time obviously.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/27/2020 | 3:57:43 PM
Dashboards
Such platforms help reduce the amount of time analysts are swapping between different dashboards on different products, the company said in a statement. I think leads about dashboards not about not knowing where to look and what information can help.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/27/2020 | 3:56:22 PM
GCP
Google reabsorbed Chronicle back into its Google Cloud business, potentially reducing the independent threat platform into a service offering on the Google Cloud Platform (GCP) This may mean you can not have it unless you have GCP as well.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/27/2020 | 3:54:04 PM
Context
Backstory, a cloud-based service to bring varied threat intelligence together to give security teams context regarding threats facing their business. Providing context would be most valuable obviously, just want to wait and see what they mean by it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
2/27/2020 | 3:50:34 PM
Rules decay
This advanced threat detection provides massively scalable, real-time and retroactive rule execution." When I hear anything rule based the I can easily guess that it will be a challenge to maintain.
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11565
PUBLISHED: 2020-04-06
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa.
CVE-2020-11558
PUBLISHED: 2020-04-05
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_m...
CVE-2020-11547
PUBLISHED: 2020-04-05
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-11548
PUBLISHED: 2020-04-05
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.