Threat Intelligence

9/11/2018
05:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ThreatConnect Now Integrates with Dragos Worldview Intelligence

Security teams can act efficiently to identify malicious actors targeting worldwide industrial networks

September 11, 2018 - Arlington, VA - ThreatConnect, Inc.®, provider of the industry's only extensible, intelligence-driven security platform, is proud to announce its integration with Dragos WorldView intelligence, which delivers critical insight about threat activity groups specifically targeting industry control networks (ICS) worldwide.

With this integration, ThreatConnect users have the ability to import Reports and Indicators, along with all of their context, from the Dragos WorldView API into ThreatConnect. Users gain the necessary information and relevance to identify malicious actors and activity targeting industrial control networks globally. This knowledge enables industrial control system (ICS) defenders to make tactical and strategic recommendations about their environments quickly and confidently.

ThreatConnect VP of Product Andy Pendergast said, "Malicious actors are increasingly targeting OT (operational technology) networks. With Dragos Worldview intelligence integrated into ThreatConnect, we can bridge the gap that these actors often exploit between the IT and OT networks. Security teams are able to keep situationally aware of threats relevant to them, alert on any related activity to these threats in their IT networks and act on them efficiently with any of our dozens of integrations into their standard security controls.”

For more information about ThreatConnect’s integration with Dragos WorldView, we invite you to join us for our upcoming webinar, The Diamond: An Analyst’s Best Friend on Tuesday, September 18th at 2:00pm EST. To register or for more information, please visit: https://go.threatconnect.com/diamond-model-webinar

 

About ThreatConnect

ThreatConnect Inc.®, the pioneer in threat intelligence platforms, arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry's only extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis, automation, and orchestration needs of security teams at any maturity level. More than 1,600 companies and agencies worldwide use the ThreatConnect platform to integrate their security technologies, teams, and processes with relevant threat intelligence resulting in reduced detection and response time for enhanced asset protection. To register for a free ThreatConnect account or learn more, visit: https://www.threatconnect.com/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11358
PUBLISHED: 2019-04-20
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2019-11359
PUBLISHED: 2019-04-20
Cross-site scripting (XSS) vulnerability in display.php in I, Librarian 4.10 allows remote attackers to inject arbitrary web script or HTML via the project parameter.
CVE-2018-20817
PUBLISHED: 2019-04-19
SV_SteamAuthClient in various Activision Infinity Ward Call of Duty games before 2015-08-11 is missing a size check when reading authBlob data into a buffer, which allows one to execute code on the remote target machine when sending a steam authentication request. This affects Call of Duty: Modern W...
CVE-2019-11354
PUBLISHED: 2019-04-19
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices ...
CVE-2019-11350
PUBLISHED: 2019-04-19
CloudBees Jenkins Operations Center 2.150.2.3, when an expired trial license exists, allows Cleartext Password Storage and Retrieval via the proxy configuration page.