Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.


#IncidentResponse #ransomware
Attack, Malware, Biometrics, Economics, Detection theory, 28 Days Later

@HackingDave shared
On Mar 9, 2022
RT @TrustedSec: Feb 27, 2022: a cache of chat logs from the notorious #ransomware group Conti was anonymously leaked to the public. Join our #IncidentResponse Team on March 15 to understand how to practically use the information found in the leak to improve your security! https://t.co/6NTsq6Gocc
Open

Detections and Defensive Insights From the ContiLeaks

Learn more about Webinar - Detections and Defensive Insights From the ContiLeaks from TrustedSec, the leading US security consulting team.

@HackingDave shared
On Mar 9, 2022
RT @TrustedSec: Feb 27, 2022: a cache of chat logs from the notorious #ransomware group Conti was anonymously leaked to the public. Join our #IncidentResponse Team on March 15 to understand how to practically use the information found in the leak to improve your security! https://t.co/6NTsq6Gocc
Open
Detections and Defensive Insights From the ContiLeaks

Detections and Defensive Insights From the ContiLeaks

Learn more about Webinar - Detections and Defensive Insights From the ContiLeaks from TrustedSec, the leading US security consulting team.

Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them

Modern Ransomware’s Double Extortion Tactics and How to Protect Enterprises Against Them

Contents Modern Ransomware Case Study: Nefilim 13 Shifts in Criminal Business Models 5 Conclusion 52 Appendix 55 Published by Trend Micro Research Written by Mayra Fuentes, Feike ...

Click here to read the article

Click here to read the article

Category T2-T3 2020-2021 Key points in T3 2021 Overall threat detections +7.2% ↑ -16.0% Top threat: HTML/Phishing.Agent trojan Infostealers -15.2% ↓ N/A Rise in banking malware Ransomware ...

Conti Group Leaked!

Conti Group Leaked!

The conflict in Ukraine has driven significant attention from the cybersecurity community, due in large part to the cyber attacks conducted against Ukraine infrastructure — including ...

Striking Back: Hunting Cobalt Strike using Sysmon and Sentinel

Striking Back: Hunting Cobalt Strike using Sysmon and Sentinel

Striking Back: Hunting Cobalt Strike using Sysmon and Sentinel Wednesday, February 24 from 1-2pm EST Presented by Binary Defense and TrustedSec  Cobalt Strike is a powerful adversary ...

Why You May Not Need to Monitor the Dark Web

Why You May Not Need to Monitor the Dark Web

To understand which industries can truly benefit from dark web monitoring we must first understand what it is – and what it isn’t.

Protect Your Organization From MosaicRegressor and Other UEFI Implants

Protect Your Organization From MosaicRegressor and Other UEFI Implants

The recent discovery of MosaicRegressor spyware is the latest in an ongoing trend of UEFI implants observed in the wild. Eclypsium detects these attacks, and shows you how to defend your ...

Cyberthreats to financial institutions 2020: Overview and predictions

Cyberthreats to financial institutions 2020: Overview and predictions

Short overview of year's key events, analysis of forecasts for 2019 and our predictions about cyberthreats to financial institutions in 2020

‘Zombie’ Ryuk ransomware group returns from the grave

‘Zombie’ Ryuk ransomware group returns from the grave

A prolific ransomware actor seemingly disappeared earlier this year. Now they're back with a vengeance, most recently linked to a string of hospital attacks.

Intelligence Insights: January 2022

Intelligence Insights: January 2022

Log4j target found in VMware Horizon, new BLISTER loader may contain Cobalt Strike beacons, and ManageEngine exploitation continues.

Cybersecurity : The Winner’s Game and The Loser’s Game

Cybersecurity : The Winner’s Game and The Loser’s Game

There is a seminal paper in finance by Charles Ellis called the The Loser’s Game which, in simple terms, foretells the move from active to passive investing and the reasons for it. My ...

What’s Next in the Evolution of Complex RansomOps?

What’s Next in the Evolution of Complex RansomOps?

Remember, the actual ransomware payload is the tail end of a RansomOps attack, so there are weeks or even months of detectable activity where a ransomware attack can be disrupted before ...