Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.


2010s, 2016, Management, Security, United States, Cyberwarfare

@cybereason shared
On Apr 7, 2022
WEBINAR tomorrow, 4/7 - 2022 MITRE ATT&CK evaluations explained ➖ How to interpret the results ➖ The difference between Technique, Tactic, and Telemetry detections ➖ Why organizations are mapping to the MITRE ATT&CK framework and what’s next https://t.co/Bn1896KULh #webinar
Open

2022 MITRE ATT&CK EVALUATIONS EXPLAINED

The Cybereason team has participated in all MITRE ATT&CK evaluations and is dedicated to helping organizations defend against real-world adversaries.

@cybereason shared
On Apr 7, 2022
WEBINAR tomorrow, 4/7 - 2022 MITRE ATT&CK evaluations explained ➖ How to interpret the results ➖ The difference between Technique, Tactic, and Telemetry detections ➖ Why organizations are mapping to the MITRE ATT&CK framework and what’s next https://t.co/Bn1896KULh #webinar
Open
2022 MITRE ATT&CK EVALUATIONS EXPLAINED

2022 MITRE ATT&CK EVALUATIONS EXPLAINED

The Cybereason team has participated in all MITRE ATT&CK evaluations and is dedicated to helping organizations defend against real-world adversaries.

Webinar April 7th: 2021 MITRE ATT&CK Evaluations Explained

Webinar April 7th: 2021 MITRE ATT&CK Evaluations Explained

The MITRE ATT&CK evaluations test security vendors’ ability to quickly detect and stop tactics and techniques used by today’s threat actors. In this webinar, we strip down the complexity of ...

MITRE ATT&CK for ICS Live Demonstration

MITRE ATT&CK for ICS Live Demonstration

MITRE released its new ATT&CK for Industrial Control Systems (ICS) as a community resource on the tactics and techniques of ICS threats and a common lexicon for the community. This ...

4 types of ransomware and a timeline of attack examples

4 types of ransomware and a timeline of attack examples

Take a look at our ransomware timeline that includes more than 30 examples, along with an explanation of how the four types of ransomware function.

UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia

UK, US and its allies blame Russia’s GRU for 2019 cyber-attacks on Georgia

Britain and the United governments blame Russia for being behind a destructive cyber attack that hit Georgia during 2019. The governments of Britain and the US declared that Russia’s ...

Early Findings: Review of State and Local Government Ransomware Attacks

Early Findings: Review of State and Local Government Ransomware Attacks

Allan Liska reports on various findings and trends to determine whether or not ransomware is on the rise in the state and local government sector.

Brazil leads in ransomware attacks

Brazil leads in ransomware attacks

The country ranks second after the United States on a list of the world's five most targeted markets

Aon acquires Cytelligence, a firm with deep expertise in cyber incident response

Aon acquires Cytelligence, a firm with deep expertise in cyber incident response

The acquisition will help Aon expand its current coverages within the cyber market at a time when cyber claims are almost doubling year-over-year.

MITRE Engenuity ATT&CK® Evaluations Announces Results from Fourth Round of Enterprise Evaluations

MITRE Engenuity ATT&CK® Evaluations Announces Results from Fourth Round of Enterprise Evaluations

McLean, Va., and Bedford, Mass., March 31, 2022 —MITRE Engenuity ATT&CK® Evaluations (Evals), a program of MITRE Engenuity™, MITRE’s tech foundation for public good, today released its ...

Cybersecurity By The Numbers: Market Estimates, Forecasts, And Surveys

Cybersecurity By The Numbers: Market Estimates, Forecasts, And Surveys

The state of the cybersecurity industry and practice according to recent surveys and analysis

Public speaking

Public speaking

Hire cybersecurity and internet privacy expert Graham Cluley to give a keynote speech at your event or conference.

Patching Our Digital Fut

Patching Our Digital Fut

The digital transformation — underpinned by affordable communications and cheap devices — has introduced new risks that cannot be ignored

Upcoding may have led to higher MA payments

Upcoding may have led to higher MA payments

New research points to overstated risk differences between Medicare Advantage and traditional fee-for-service populations, which the authors say are the result of upcoding within the risk ...

New York Firm Sells Chinese Tech with Cybersecurity Vulnerabilities to U.S. Military

New York Firm Sells Chinese Tech with Cybersecurity Vulnerabilities to U.S. Military

New York Firm Sells Chinese Tech with Cybersecurity Vulnerabilities to U.S. Military