Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 01.09.2022.

Attack
Security
Psychology
Security police
Sun Microsystems
Attribute

@PatrickCMiller shared
On Aug 28, 2022
'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2 https://t.co/3kAWMGBPgL
Open
'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2

'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2

Microsoft and others say they have observed nation-state actors, ransomware purveyors, and assorted cybercriminals pivoting to an open source attack-emulation tool in recent campaigns.

@cybereason shared
On Aug 30, 2022
WEBINAR📆Thursday September 8th 2022 Have we learned from our past mistakes when it comes to #ransomware? Join our session as we discuss the impact of ransomware on Incident Response strategies https://t.co/4W0OgG4LbQ #webinar #infosec
Open
Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies

Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies

Over the last five years ransomware operations evolved both in capabilities and the degree of organizational structure behind it. In this webinar, we’ll cover the changes, what they mean ...

@DarkReading shared
On Aug 30, 2022
RT @otherjimdonahue: "Many times, the impediment to effective security is not necessarily technical but, rather, a cultural issue. Many often mistakenly equate user education and training with the creation of a security culture." -Edward Liebig, @HexagonAB https://t.co/9TCiGelr0p
Open
Security Culture: An OT Survival Story

Security Culture: An OT Survival Story

The relationship between information technology and operational technology will need top-down support if a holistic security culture is to truly thrive.

@PatrickCMiller shared
On Aug 31, 2022
Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware https://t.co/MLZ6tGWd4t
Open
Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware

Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware

Nearly half of respondents say their company relies on outdated backup and recovery infrastructure — in some cases dating back to the 1990s, before today's sophisticated cyberattacks.

@PatrickCMiller shared
On Aug 27, 2022
Capital One Joins Open Source Security Foundation https://t.co/lFAdfD6L5Z
Open
Capital One Joins Open Source Security Foundation

Capital One Joins Open Source Security Foundation

OpenSSF welcomes Capital One as a premier member affirming its commitment to strengthening the open source software supply chain.

@PatrickCMiller shared
On Aug 29, 2022
Threat Roundup for August 19 to August 26 https://t.co/9l4Writjcl
Open
Threat Roundup for August 19 to August 26

Threat Roundup for August 19 to August 26

A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group

@Mandiant shared
On Aug 26, 2022
Join the Mandiant Behavioral Research Team as they explore the merits of security validation, and how content is critical to measuring security effectiveness. Register for the webinar today! https://t.co/j9tCMffpnp https://t.co/wLBHKDXNwx
Open
Beyond IOCs: Validate security controls with quality threat intelligence

Beyond IOCs: Validate security controls with quality threat intelligence

Leave Your IOC's at the door and learn to validate security controls with quality threat intelligence. Please join the Mandiant Behavioral Research Team as they explore the merits of ...

@PatrickCMiller shared
On Aug 31, 2022
Key takeaways from the Open Cybersecurity Schema Format https://t.co/hD3TP8VMLy
Open
Key takeaways from the Open Cybersecurity Schema Format

Key takeaways from the Open Cybersecurity Schema Format

The OCSF looks to standardize and normalize the data that cybersecurity tools generate with the goal of making them work better together.