DRTV

Free endpoint scanning service powered by Open Threat Exchange

100%
0%

Russ Spitler, AlienVaults SVP of Products, explains how security pros can leverage the community-powered threat intelligence of OTX which sees more than 19 million IoCs contributed daily by a global community of 80,000 peers to quickly protect themselves against emerging attacks.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
PhillipLyons
50%
50%
PhillipLyons,
User Rank: Apprentice
8/11/2018 | 9:02:25 AM
Re: video
It allows private firms, security researchers, and government agencies to openly collaborate and share information on emerging threats, attack methods, and malicious actors. Now that is a collective effort to fight a nig problem. BRAVO!
DanielHeller
50%
50%
DanielHeller,
User Rank: Apprentice
7/6/2018 | 12:57:32 AM
video
I really appreciate this post. I've been looking all over for this! Thank goodness I found it on this blog . You have made my day! I think this is engaging and eye-opening [url=https://rospher.com/article/Personal-Statement-Writing/]custom essay writing service[/url] material. Thank you so much for caring about your content and your readers.
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Oh, No, Not Another Security Product
Paul Stokes, Founder & CEO of Prevalent AI,  8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.