In the Last 7 days there's been 35 influencers like PatrickCMiller and InfosecurityMag, discussing topics such as #cybersecurity, #threatinteland #CISASummit.



Trends


Top hashtags

Top influencers

  PatrickCMiller
  InfosecurityMag
  likethecoins
  msftsecurity
  JohnLaTwC
  SushiDude
  taosecurity
  CrowdStrike
  DarkReading

Top sources

source img infosecurity-magazine.com
source img sans.org
source img darkreading.com
source img theregister.com
source img zdnet.com
source img medium.com
source img techcommunity.microsoft.com
source img us-cert.cisa.gov
source img cisa.gov

News

In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary Behaviors

On Sep 29, 2020
@Mandiant shared
We worked together with @MITREattack to explore ways of visualizing the MITRE Enterprise and ICS ATT&CK knowledge bases together as a single matrix visualization. Check-out the blog post: https://t.co/OdRUlbs7dl https://t.co/ahGIVLS1bA
Open

We evaluate the integration of a hybrid MITRE ATT&CK matrix visualization that accurately represents the complexity of events across the OT Targeted Attack Lifecycle.

www.fireeye.com
On Sep 29, 2020
@Mandiant shared
We worked together with @MITREattack to explore ways of visualizing the MITRE Enterprise and ICS ATT&CK knowledge bases together as a single matrix visualization. Check-out the blog post: https://t.co/OdRUlbs7dl https://t.co/ahGIVLS1bA
Open

In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary Behaviors

In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for
Enterprise and ICS to Communicate Adversary Behaviors

We evaluate the integration of a hybrid MITRE ATT&CK matrix visualization that accurately represents the complexity of events across the OT Targeted Attack Lifecycle.


On Sep 30, 2020
@PatrickCMiller shared
Navigating the Asia-Pacific Threat Landscape: Experts Dive In https://t.co/9THq9QzDw3
Open

Navigating the Asia-Pacific Threat Landscape: Experts Dive In

Navigating the Asia-Pacific Threat Landscape: Experts Dive In

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.

On Sep 25, 2020
@PatrickCMiller shared
Code execution, defense evasion are top tactics used in critical attacks against corporate endpoints https://t.co/iaWcMMJmWM
Open

Code execution, defense evasion are top tactics used in critical attacks against corporate endpoints

Code execution, defense evasion are top tactics used in critical attacks against corporate endpoints

Cisco examines MITRE ATT&CK data to suggest the threat vectors enterprise security staff should focus their efforts on.

On Sep 26, 2020
@PatrickCMiller shared
Google Launches Enterprise Threat Detection Solution https://t.co/m6f0usyQSs
Open

Google Launches Enterprise Threat Detection Solution

Google Launches Enterprise Threat Detection Solution

Google this week announced the availability of Chronicle Detect, a threat detection solution for enterprises from Google Cloud

On Sep 26, 2020
@edskoudis shared
RT @RobertMLee: I haven’t taught in awhile given everything going on. I just added a SANS FOR578 - Cyber Threat Intel run to my schedule for Dec 14th week (CDI). Will be good to return to the digital classroom and hope to see y’all there https://t.co/kjyNwJ5RnL #GCTI #DFIR @sansforensics
Open

FOR578: Cyber Threat Intelligence

FOR578: Cyber Threat Intelligence

FOR578 teaches the tactical, operational, and strategic level of cyber threat intelligence skills and tradecraft required to make security teams more effective.

On Sep 24, 2020
@redcanaryco shared
RT @old_Red_f0x: While brushing up on my knowledge of ATT&CK I came across a blog post from @redcanaryco about using ATT&CK for threat hunting. Now on my Thursday reading list.https://t.co/nGe68cxi2P
Open

How to use MITRE ATT&CK to mature your threat hunting program

How to use MITRE ATT&CK to mature your threat hunting program

Watch this on-demand webinar featuring experts from Red Canary, Carbon Black, and MITRE to learn how to mature your threat hunting program with ATT&CK.

On Sep 25, 2020
@JohnLaTwC shared
RT @jsnover: If you watched my #MSIgnite sessions, you know how WILDLY optimistic I am about Jupyter notebooks. Here is a great example of the sort of thing I'm excited about. https://t.co/5ukiyEiMzr
Open

PowerShell+Azure Sentinel notebooks to supercharge your threat hunting and investigations!

PowerShell+Azure Sentinel notebooks to supercharge your threat hunting and investigations!

For those interested in security and security analytics, we recently published an article on how you can now enable PowerShell Jupyter notebooks via .Net Interactive Public Preview for use ...

On Sep 25, 2020
@PatrickCMiller shared
FERC, NERC Conduct Study on Cyber Incident Response at Electric Utilities https://t.co/b05gqKfgw3
Open

FERC, NERC Conduct Study on Cyber Incident Response at Electric Utilities

FERC, NERC Conduct Study on Cyber Incident Response at Electric Utilities

U.S. FERC and NERC release a report outlining cyber incident response and recovery best practices for electric utilities

On Sep 30, 2020
@DarkReading shared
Attacker Dwell Time: Ransomware's Most Important Metric https://t.co/Dqysp7DcDT by @rvilladiego #ransomware #DwellTime #metric
Open

Attacker Dwell Time: Ransomware's Most Important Metric

Attacker Dwell Time: Ransomware's Most Important Metric

How to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your network.

On Sep 29, 2020
@MITREattack shared
We just released a blog post jointly written by ATT&CK for ICS Lead @ojalexander and @Mandiant. It explores a visualization drawing on both the ATT&CK for Enterprise and ICS knowledge bases to describe an adversary operating across both. Check it out at https://t.co/TaIvfTDXwC.
Open

In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary Behaviors

In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary Behaviors

A joint post exploring leveraging ATT&CK for Enterprise and ICS together in a visualization.

Browse topics

Get updates live! Follow us on

Choose your newsletters

On Oct 1, 2020
@PatrickCMiller shared
Government Employees May Need to Update Threat Hunting Perspectives https://t.co/mtVgVBFiqt
Open

Government Employees May Need to Update Threat Hunting Perspectives

Government Employees May Need to Update Threat Hunting Perspectives

As Congress considers expanding threat hunting programs into the private sector, a majority of federal workers surveyed last year didn’t seem to have a clue about such efforts within their ...

On Sep 25, 2020
@msftsecurity shared
More good news! We're announcing new innovations in Azure Sentinel to help organizations identify compromised users, get enhanced threat intelligence and simplify security operations. Get the deep dive: https://t.co/rcWiecaTKH https://t.co/RMvqof5H0f
Open

Stay ahead of threats with new innovations from Azure Sentinel

Stay ahead of threats with new innovations from Azure Sentinel

Azure Sentinel became generally available almost exactly a year ago in the weeks leading up to Microsoft Ignite 2019. The world has changed pretty dramatically since then, but our dedicated ...

On Sep 25, 2020
@redcanaryco shared
@mattifestation @mvelazco and here’s the PurpleSharp repo: https://t.co/rQZ7s2iloA
Open

PurpleSharp

PurpleSharp

PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments - mvelazc0/PurpleSharp

On Sep 24, 2020
@PatrickCMiller shared
“LokiBot,” the malware that steals your most sensitive data, is on the rise https://t.co/TAhAWDM4BX
Open

“LokiBot,” the malware that steals your most sensitive data, is on the rise

“LokiBot,” the malware that steals your most sensitive data, is on the rise

"Persistent malicious" activity sees a "notable increase" since July, feds say.

On Sep 24, 2020
@PatrickCMiller shared
Google Cloud Debuts Threat-Detection Service https://t.co/fSL3q566Lt
Open

Google Cloud Debuts Threat-Detection Service

Google Cloud Debuts Threat-Detection Service

Lockdown economics are driving a threat-intelligence business boom. Chronicle Detect is Google's answer to monitoring so much log data created by the distributed workforce.

On Sep 28, 2020
@RobertMLee shared
RT @DragosInc: New Dragos Threat Intelligence App for #Splunk now available in Splunkbase! This app provides @Splunk users with easier access to Dragos WorldView industrial threat indicators. Learn more here: https://t.co/cIY01qCW7t #ITcybersecurity #OTcybersecurity #IT #OT #cybersecurity https://t.co/YwtPd6IFDf
Open

Dragos

Dragos

This partnership expands the ICS cybersecurity ecosystem to ensure critical infrastructure and industrial organizations are better prepared with enhanced visibility that improves threat ...

On Sep 30, 2020
@InfosecurityMag shared
Is Your Organization Ready to Defend Insider Threats? https://t.co/ml51df8DHA
Open

Is Your Organization Ready to Defend Insider Threats?

Is Your Organization Ready to Defend Insider Threats?

How can you assess your organization’s readiness to detect and respond to an Insider threat attack?

On Sep 26, 2020
@holisticinfosec shared
Get your yayas out! ⁦@EFF⁩ presents YAYA, a new F/OSS tool to help manage multiple #YARA rule repositories. YAYA imports a set of high-quality YARA rules & lets researchers add their own rules, disable specific rulesets & run files scans. Linux only. https://t.co/JhHVJc7oh0
Open

Introducing “YAYA”, a New Threat Hunting Tool From EFF Threat Lab

Introducing “YAYA”, a New Threat Hunting Tool From EFF Threat Lab

At the EFF Threat Lab we spend a lot of time hunting for malware that targets vulnerable populations, but we also spend time trying to classify malware samples that we have come across. One ...

On Sep 25, 2020
@msftsecurity shared
We're announcing new capabilities to provide agentless security for unmanaged IoT and Operational Technology devices in Azure Defender for IoT — previously Azure Security Center for IoT. Learn more: https://t.co/qZRLpkOxmD https://t.co/HLtKCbGnYC
Open

Azure Defender for IoT: Agentless Security for OT

Azure Defender for IoT: Agentless Security for OT

Summary Azure Defender for IoT delivers agentless security for continuously monitoring Operational Technology (OT) devices in industrial and critical infrastructure networks. Incorporating ...

On Sep 30, 2020
@RSAConference shared
What happens to a person’s mental health during a cyberattack? Psychiatrist @ryanlouie discuss the impacts on victims and first-responders in this #RSAC 2020 session. Watch here: https://t.co/b5ZjzHPKbn
Open

#Psybersecurity: Mental Health Impact of Cyberattacks

#Psybersecurity: Mental Health Impact of Cyberattacks

Download pdf What happens to a person’s mental health during a cyberattack? This session will discuss the impacts on victims and first-responders. Attendees will gain an understanding of ...

On Sep 27, 2020
@wendynather shared
RT @DfirDiva: Links to Over 100 FREE #DFIR Training Resources Categories: -General Cybersecurity -Incident Response -Digital Forensics -Malware Analysis & Reverse Engineering -DFIR CTFs & Challenges -Linux -Networking -Programming -#OSINT -For Veterans -For Kids https://t.co/dDw2PF3Ckk https://t.co/qn20cuDi5O
Open

Free Training

Free Training

This is a list of free DFIR and cybersecurity related training that I’ve heard of. This list is updated on a regular basis. AccessData Certified Investigator (Only the cert is free, not the ...