Threat Intelligence

Threat Hunting: Going After The Big Game

100%
0%

It's Jian Zhen's turn at the News Desk, as the senior VP of product for Endgame discusses the company's automated hunting platform for detecting and evicting event adversaries. It doesn't require a trip to the jungle: Endgame has added pre-exploit detection, malware scoring, and automated investigation to its services. We also discuss HaaS (Hunting as a Service), which is a managed service for organizations that lack the security talent to detect threats before they happen.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
randallsykes
100%
0%
randallsykes,
User Rank: Apprentice
7/19/2017 | 4:03:52 PM
Website Design
Good post/video. I'll be checking out the other content on this site as well, very informative.
Rico777
50%
50%
Rico777,
User Rank: Apprentice
2/21/2017 | 10:05:29 AM
Good video
Very interesting video, thank you so much
SEO Marketing
50%
50%
SEO Marketing,
User Rank: Apprentice
1/12/2017 | 2:48:19 PM
SEO Marketing
I like this site.  You can learn a lot here.  Thanks!
Benefiter
50%
50%
Benefiter,
User Rank: Apprentice
11/12/2016 | 10:06:47 AM
Re:
Fine post. Thanks, I ll follow the next one. Useful and interesting information.  
Lily652
50%
50%
Lily652,
User Rank: Moderator
11/12/2016 | 5:17:00 AM
prayer times
good video, interesting information, I also agree with all
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.