Threat Intelligence

Threat Hunting: Going After The Big Game

100%
0%

It's Jian Zhen's turn at the News Desk, as the senior VP of product for Endgame discusses the company's automated hunting platform for detecting and evicting event adversaries. It doesn't require a trip to the jungle: Endgame has added pre-exploit detection, malware scoring, and automated investigation to its services. We also discuss HaaS (Hunting as a Service), which is a managed service for organizations that lack the security talent to detect threats before they happen.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
randallsykes
100%
0%
randallsykes,
User Rank: Apprentice
7/19/2017 | 4:03:52 PM
Website Design
Good post/video. I'll be checking out the other content on this site as well, very informative.
Rico777
50%
50%
Rico777,
User Rank: Apprentice
2/21/2017 | 10:05:29 AM
Good video
Very interesting video, thank you so much
SEO Marketing
50%
50%
SEO Marketing,
User Rank: Apprentice
1/12/2017 | 2:48:19 PM
SEO Marketing
I like this site.  You can learn a lot here.  Thanks!
Benefiter
50%
50%
Benefiter,
User Rank: Apprentice
11/12/2016 | 10:06:47 AM
Re:
Fine post. Thanks, I ll follow the next one. Useful and interesting information.  
Lily652
50%
50%
Lily652,
User Rank: Moderator
11/12/2016 | 5:17:00 AM
prayer times
good video, interesting information, I also agree with all
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Be a unicorn, not a donkey...
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.