Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

3/5/2019
10:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SafeGuard Cyber Launches New Tool to Detect, Defend Against Cross-Channel Cyber Threats

The machine learning-powered threat decision engine is designed to detect risks across social media, enterprise apps, Deep Web, and Dark Web to protect businesses from emerging attacks.

Charlottesville, Virginia, March 01, 2019 (GLOBE NEWSWIRE) -- SafeGuard Cyber, the leading end-to-end platform for social media and digital risk protection, responding to the defensive needs of government and corporate customers, today launched a new detection capability that adds real-time cross-channel analysis to proactive scans across the digital landscape, including deep web sites, the dark web, and the social internet. The new capabilities provide security professionals with a holistic view of actionable threat intelligence to digital channels, an area of expanding risks and priority for security teams.

“Today’s cyber threats are growing in complexity, and hackers don't operate in silos. Bad actors can pull account credentials from the dark web, deploy botnets, and launch multi-pronged attacks from many social channels,” noted SafeGuard Cyber CTO and Co-Founder Otavio Freire. “The new Discover capability gives our clients enhanced visibility into critical channels, helps them prioritize risks, and helps them easily and quickly respond to multi-vector threats.”

The new Discover capability is enhanced by Threat Cortex, SafeGuard Cyber’s proprietary decision engine, which is powered by machine learning. Threat Cortex was designed to give CISOs’ SOC teams a simple way to receive actionable threat intelligence. As risk event information is gathered, Threat Cortex prioritizes the most critical risks for the SOC team to focus on. The technology continually assesses security teams’ subsequent responses to learn and adapt to the most relevant and evolving threats, giving companies a digital risk protection solution customized to their unique needs.

“Discover, together with Threat Cortex, reaffirms our commitment to making the CISO’s job easier. Most CISOs we speak to are overwhelmed with data. This new technology empowers our clients to translate alarm bells into action against digital risks efficiently and at scale,” said SafeGuard Cyber CEO and Co-Founder Jim Zuffoletti.

For more information about Discover and Threat Cortex, visit SafeGuard Cyber at the RSA Conference 2019, booth #3111 or at https://www.safeguardcyber.com/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16199
PUBLISHED: 2019-09-17
eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.
CVE-2019-16391
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows authenticated visitors to modify any published content and execute other modifications in the database. This is related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php.
CVE-2019-16392
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows prive/formulaires/login.php XSS via error messages.
CVE-2019-16393
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 mishandles redirect URLs in ecrire/inc/headers.php with a %0D, %0A, or %20 character.
CVE-2019-16394
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 provides different error messages from the password-reminder page depending on whether an e-mail address exists, which might help attackers to enumerate subscribers.