Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12/10/2010
10:10 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Emerging Threats Partners With NitroSecurity

Technology partnership aims to share threat intelligence and research

News Facts:

* Emerging Threats Pro, the most comprehensive intrusion prevention solution available, and NitroSecurity, the leader in high-performance, content-aware security information and event management solutions (SIEM), today announced a technology partnership to share threat intelligence and research. * In today's IT environment, new malware threats are emerging so rapidly that security solutions are struggling to keep pace. Information is the key component of any defense against new attacks and this partnership provides each company with greater access to the intelligence needed to thwart emerging attacks. By sharing threat intelligence, rules and research, Emerging Threats and NitroSecurity will enhance their view of the evolving IT threat landscape. * Emerging Threats Pro and NitroSecurity customers will benefit from the research of both organizations and the unique capabilities each team brings to the industry. * NitroSecurity and Emerging Threats will share research and combine rulesets to allow both organizations to offer a more complete and more effective security solution to their clients. * Emerging Threats Pro is an open source IDS/IPS ruleset, which combines the best of the Emerging Threats open source community, along with an experienced, full-time research team, and the industry-leading Telus vulnerability and malware research to cover the full range of threats facing security professionals today. * It is the only ruleset available today that supports Suricata and all versions of Snort back to 2.4. * NitroSecurity is a leading cybersecurity and compliance management company that develops the industry's fastest and most scalable analytical tools to gather and analyze information on security threats in real time. This allows its customers to stay updated on potential attacks while fulfilling stringent regulatory requirements.

Quotes:

* "At Emerging Threats, we think better intelligence leads to better security," said Matt Jonkman, founder and CEO of Emerging Threats Pro. "Our partnership with Nitro Security is evidence of that commitment. With the combined resources and research of our two companies, customers will no doubt benefit from greater security coverage and defenses against even the most aggressive and unique brands of attacks." * "Relentless advances in malware and cyberthreats will continue in 2011," said Jeremy Conway, Senior Security Analyst at NitroSecurity. "Comprehensive data analyzed in real time is the key to effective threat detection and incident response. By working together, NitroSecurity and Emerging Threats will significantly expand the cyber threat knowledge base and help IT security teams recapture the advantage."

About Emerging Threats Pro

Emerging Threats produces the fastest and most diverse IDS signature set and firewall rules available today. Through dedicated researchers and the support of its open source community, the company offers all users and organizations both free and commercial content that is compatible with both Snort and Suricata. For more information, please visit http://www.emergingthreatspro.com

About NitroSecurity

NitroSecurity develops high-performance security information and event management (SIEM) solutions that protect critical information and infrastructure. NitroSecurity solutions reduce risk exposure and increase network and information availability by removing the scalability and performance limitations of security information management. Utilizing the industry's fastest analytical tools, NitroSecurity identifies correlates and remediates threats in minutes instead of hours, allowing organizations to quickly mitigate risks to their information and infrastructure. NitroSecurity serves more than 500 organizations in the energy, healthcare, education, financial services, government, retail, hospitality and managed services industries. For more information, please visit http://www.nitrosecurity.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).