Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

3/5/2019
10:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SafeGuard Cyber Launches New Tool to Detect, Defend Against Cross-Channel Cyber Threats

The machine learning-powered threat decision engine is designed to detect risks across social media, enterprise apps, Deep Web, and Dark Web to protect businesses from emerging attacks.

Charlottesville, Virginia, March 01, 2019 (GLOBE NEWSWIRE) -- SafeGuard Cyber, the leading end-to-end platform for social media and digital risk protection, responding to the defensive needs of government and corporate customers, today launched a new detection capability that adds real-time cross-channel analysis to proactive scans across the digital landscape, including deep web sites, the dark web, and the social internet. The new capabilities provide security professionals with a holistic view of actionable threat intelligence to digital channels, an area of expanding risks and priority for security teams.

“Today’s cyber threats are growing in complexity, and hackers don't operate in silos. Bad actors can pull account credentials from the dark web, deploy botnets, and launch multi-pronged attacks from many social channels,” noted SafeGuard Cyber CTO and Co-Founder Otavio Freire. “The new Discover capability gives our clients enhanced visibility into critical channels, helps them prioritize risks, and helps them easily and quickly respond to multi-vector threats.”

The new Discover capability is enhanced by Threat Cortex, SafeGuard Cyber’s proprietary decision engine, which is powered by machine learning. Threat Cortex was designed to give CISOs’ SOC teams a simple way to receive actionable threat intelligence. As risk event information is gathered, Threat Cortex prioritizes the most critical risks for the SOC team to focus on. The technology continually assesses security teams’ subsequent responses to learn and adapt to the most relevant and evolving threats, giving companies a digital risk protection solution customized to their unique needs.

“Discover, together with Threat Cortex, reaffirms our commitment to making the CISO’s job easier. Most CISOs we speak to are overwhelmed with data. This new technology empowers our clients to translate alarm bells into action against digital risks efficiently and at scale,” said SafeGuard Cyber CEO and Co-Founder Jim Zuffoletti.

For more information about Discover and Threat Cortex, visit SafeGuard Cyber at the RSA Conference 2019, booth #3111 or at https://www.safeguardcyber.com/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Artist Uses Malware in Installation
Dark Reading Staff 5/17/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
CVE-2019-12172
PUBLISHED: 2019-05-17
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
CVE-2019-12168
PUBLISHED: 2019-05-17
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
CVE-2019-12170
PUBLISHED: 2019-05-17
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PH...