Kaspersky surveyed 5,200 cybersecurity and IT experts around the world and found that majority of threat intelligence analysts are banned from sharing intelligence with others, while 44% spread information because of company policy, according to ITProPortal. Seventy-seven percent of employees allowed by their companies to share intelligence do so, but some analysts occasionally share their own findings even if this is against corporate policy. While banning this activity may negatively affect the community’s cyberthreat response, Kaspersky argued that this also prevents cybercriminals from changing their strategies. “Any piece of information – be it new malware or insights on techniques used – is valuable when protecting against advanced threats. That’s why we constantly make our threat research findings available via our information resources and through our TI services. We encourage security analysts to also give a helping hand to others in the same collaborative way,” said Anatoly Simonenko, Kaspersky’s group manager for Technology Solutions Product Management.
Jill Aitoro leads editorial for SC Media, and content strategy for parent company CyberRisk Alliance. She 20 years of experience editing and reporting on technology, business and policy.
Organizations remediated security issues added to the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog 3.5 times faster than those that are not in the catalog, according to The Record, a news site by cybersecurity firm Recorded Future.
Software firms have been urged by the FBI and Cybersecurity and Infrastructure Security Agency to ensure the absence of path traversal or directory traversal vulnerabilities in their products prior to shipping, BleepingComputer reports.