One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 870394
Date de publication 2018-10-30 13:00:00 (vue: 2018-10-30 14:03:20)
Titre AlienVault Open Threat Exchange Hits Major Milestone with 100,000 Participants
Texte Today, I’m excited to announce that AlienVault® Open Threat Exchange® (OTX™) has grown to 100,000 global participants, representing 36% percent year-over-year growth. AlienVault OTX, launched in 2012, is the world’s first free threat intelligence community that enables real-time collaboration between security researchers and IT security practitioners from around the world. Every day, participants  from more than 140 countries contribute 19 million pieces of threat data to the community. OTX enables companies and government agencies to gather and share relevant, timely, and accurate information about new or ongoing cyber-attacks and threats as quickly as possible to avoid major breaches (or minimize the damage from an attack). As Russell Spitler, SVP of Product for AlienVault, an AT&T company,  explains, “Attackers rely on isolation - they benefit when defenders don’t talk to each other. We can’t be everywhere at once, but they can learn from each others’ experience. With the growth in OTX membership, we all benefit from the diversity of threat intelligence from an even wider variety of participants.” To provide big-picture perspective on the billions of security artifacts contributed to OTX this year, AlienVault Security Advocate Javvad Malik and Threat Engineer Chris Doman have created the OTX Trends Report for 2018 Q1 and Q2. Like the 2017 report, this analysis reveals trends across exploits, malware, and threat actors, including top-ten rankings of the most seen exploits and adversaries recorded in vendor reports. The analysis reveals changes in the threat landscape, including a shift in the most reported exploits. For example, this year’s report reveals a rise in server exploits, as well as marking the first time an exploit targeting IoT devices (GPON Routers) has made the list of most-seen exploits. Encouragingly, the OTX Trends Report shows an uptick in information sharing across the InfoSec industry, including a plethora of independent research sharing on Twitter. According to the report, “As more companies and researchers look at ways to share threat data, we see more usable and useful information flow into OTX. This openness and collaboration has resulted not only in organisations being able to defend themselves better - but increasing circles of trust within the industry where actual threat intelligence is being shared more openly. A trend that we have seen grow over the years.” The sheer volume of security events included in the OTX Trends Report reflects the importance of keeping up with the latest threat intelligence. Without threat sharing, malicious actors can easily reuse effective exploits and pivot their attacks from target to target. A campaign affecting the UK legal industry can be repurposed for bankers in the United States, while security researchers operating in silos start from scratch each time. For example, the OTX Trends Report shows that the most commonly reported exploit, CVE-2017-11882, has been reused widely. By joining OTX, participants can strengthen their defenses and share real-time information about emerging threats, attack methods, and malicious actors. The diversity of OTX participants representing different countries, industries, and organization sizes provi
Envoyé Oui
Condensat “as “attackers 000 100 11882 140 2012 2017 2018 able about according accurate across actors actual added addition additional adversaries advocate affecting against agencies agent alienvault alienvault® alienvault’s all alliance allows also analysis analytics and more announce any anyone anywhere anywhere™ api applying around artifacts assurance at&t attack attacks available avoid bankers based been being benefit benefits better between beyond big billions breaches bro broad busy but caldarone campaign can can’t catalogued champions changes changing chris christian circles collaboration commonly community companies company comprehensive compromise compromised connected consulting consumes continuous contribute contributed contributions correlation cost countries created critical curate curated customers cve cyber damage data dataprise day deeper defend defenders defenses deliver demo detect detecting detection deutsche devices dialog different directconnect directly diversity doman don’t done drive each earlier easier easily effective effort emerge emerging enables enabling encouragingly endpoint endpoints engineer enrich enterprise environment even events ever every everywhere example exchange exchange® excited expand experience explains exploit exploits extra feed find first first free flow free from gather global gmbh good government gpon grow grown growth hagen has have having heavyweight help hewlett hits human hunting i’m identify importance inc included including increasing independent indicators industries industry information infosec integrate integrated intel intelligence introduced invest iot isacs isolation its javvad join joining keep keeping known labs lag landscape latest launched learn learning lee legal leverage like list look machine made major malicious malik malware many mapp marking member membership methods microsoft milestone million minimize monitor more most multiple need network new not occurs officer once ongoing online only open openly openness operating organisations organization osquery other others others’ otx otx™ out over own packard participant participants participants  partner partners people percent perspective petya picture pieces pivot platform plethora possible post practitioners presence product products provide provided provider providers provides pulses qihoo360 queries quickly rankings read real recorded reduce reflects registered relevant rely report reported reports representing repurposed reputation requiring research researchers resources: respond resulted reuse reused reveals rise robust routers run russell says scan scanning scenarios scratch security security™ see seen serve server service set share shared sharing sheer shift shows silos sizes solutions source specialized spitler start states stix stix/taxii strategic strengthen subscribe support svp synchronized take talk target targeting taxii team teams telefonica ten test than thanks themselves thomas threat threats through time timely times today too top trend trends trust twitter united updates uptick usable use useful users uses usm validate variety vendor very volume wannacry ways well when where whether which widely wider within without words world world’s year year’s years your
Tags Threat
Stories Wannacry
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: