Cybersecurity

Mitre ATT&CK

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 06.04.2023.

#cybersecurityroadmap
#cybersecurity
#cyberhygiene
#democratic
#resilience
#threathunting
#3CX
#Splunk

@PatrickCMiller shared
On Apr 4, 2023
Western Digital Shuts Down Services Due to Cybersecurity Breach https://t.co/cAvL1pbDoX
Open
Western Digital Shuts Down Services Due to Cybersecurity Breach

Western Digital Shuts Down Services Due to Cybersecurity Breach

Western Digital shuts down several of its services after discovering a network security breach that could involve ransomware.

@PatrickCMiller shared
On Apr 3, 2023
Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months https://t.co/zzh97PYR91
Open
Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months

Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months

Blog posts, advisories and tools to help organizations that may have been hit by the 3CX supply chain attack.

@SecurityWeek shared
On Apr 4, 2023
CardinalOps Extends MITRE ATT&CK-based Detection Posture Management - https://t.co/3rAbtBJTjq
Open
CardinalOps Extends MITRE ATT&CK-based Detection Posture Management

CardinalOps Extends MITRE ATT&CK-based Detection Posture Management

CardinalOps has extended its detection posture management capability with MITRE ATT&CK Security Layers

@Trellix shared
On Apr 3, 2023
Being targeted by Royal Ransomware can cause king-sized problems. 👑 @TrellixARC researchers Alexandre Mundo and @Libranalysis explain the details you need to know about the group on the blog. https://t.co/PAjt5Rosqr https://t.co/YDfe1tkFEN
Open
A Royal Analysis of Royal Ransom

A Royal Analysis of Royal Ransom

This blog will dive deep into the inner workings of Royal Ransom’s Windows and Linux executables, after which an anonymized Royal Ransom incident response case is discussed.

@CISecurity shared
On Apr 3, 2023
🚌 It's time to hit the road and implement your #cybersecurity roadmap. Once you have hit the road, you can't forget about essential #cyberhygiene. https://t.co/0If5rnbc2V #cybersecurityroadmap https://t.co/r5cuniwqrT
Open
Hit the Road and Implement Your Cybersecurity Roadmap

Hit the Road and Implement Your Cybersecurity Roadmap

When it's time to put your cybersecurity roadmap into action, you might be wondering how to get started. Tony Sager has the answers.

@CrowdStrike shared
On Apr 4, 2023
RT @EMEA_GCA: We at GCA with expert partners @CrowdStrike and @IFES1987 have presented today a Global Elections Security Report in London. The analysis puts forward 10 concrete ways to improve #democratic #resilience. Full story and link to the report available here https://t.co/pHBoDP2V9Q https://t.co/8JhEo1Szjp
Open
GCA and Partners Present a Global Elections Security Report

GCA and Partners Present a Global Elections Security Report

The Global Elections Security Report presented in London today contains ten recommendations that are critical to ensuring election security.

@meansec shared
On Mar 31, 2023
RT @M_haggis: The Splunk Threat Research Team 🛡️ had a chance to rip through the #3CX fun and we wanted to share some reversing, security content and #threathunting 🏹. Check it out for you dose of #Splunk! https://t.co/Gqt35ObwAR
Open
Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise

Splunk Insights: Investigating the 3CXDesktopApp Supply Chain Compromise

In this Splunk blog post, we aim to equip defenders with the necessary tools and strategies to actively hunt down and counteract this campaign. Additionally, we will offer some resilient ...

@likethecoins shared
On Apr 3, 2023
RT @HackingLZ: New @TheDFIRReport https://t.co/fmca06oNda
Open
Malicious ISO File Leads to Domain Wide Ransomware

Malicious ISO File Leads to Domain Wide Ransomware

IcedID continues to deliver malspam emails to facilitate a compromise. This case covers the activity from a campaign in late September of 2022. Post exploitation activities detail some ...