Cybersecurity Essentials

Mitre ATT&CK

The cybersecurity market already top $100 billion per year and will reach $300 billion by 2024. With that kind of money at stake, this market is one of the hottest areas for IT innovation.

Top news of the week: 02.02.2021.

#Bazar
#CobaltStrike
#ESETresearch
#KobalosMalware
#securitydrill
#IncidentResponse
#IR
#CISO
#cybersecurity

Mitre Attack

@olafhartong shared
On Feb 1, 2021
RT @TheDFIRReport: Bazar, No Ryuk? ➡️ Initial Access: DocuSign themed maldoc ➡️ Discovery: AdFind, PowerSploit, Net, Get-ADComputer, etc. ➡️ Lateral Movement: PtH, SMB, RDP ➡️ Credential Access: Lsass dump via #CobaltStrike ➡️C2: #Bazar & #CobaltStrike https://t.co/GdfsyElbaA https://t.co/8v1roiEjy0
Open
Bazar, No Ryuk?

Bazar, No Ryuk?

In this case, we will describe how the threat actor went from a DocuSign themed, malicious document, to domain wide compromise, using Bazar (KEGTAP) and Cobalt Strike.

@msftsecurity shared
On Jan 28, 2021
We recently detected cyberattacks targeting security researchers by an actor we track as ZINC—a DPRK-affiliated and state-sponsored group. Read our blog for information on related IoCs and detections: https://t.co/Tpv7JhvGSv @MSFTSecIntel
Open
ZINC attacks against security researchers

ZINC attacks against security researchers

In recent months, Microsoft has detected cyberattacks targeting security researchers by an actor we track as ZINC. Observed targeting includes pen testers, private offensive security ...

@cybereason shared
On Jan 28, 2021
New partnership! Cybereason and Ensign enable mutual customers access to elite threat hunting, next-generation detection and response capabilities, and delivers actionable security intelligence to address evolving cyber risks faced by organisations. https://t.co/3V1vhmjQNC
Open
Cybereason Partners with Ensign to Provide Managed Detection and Response Services in APAC

Cybereason Partners with Ensign to Provide Managed Detection and Response Services in APAC

Partnering with Ensign enables cyber defenders to take the fight directly to the adversary across endpoints, the enterprise and everywhere cyber battles are fought.

@strandjs shared
On Feb 1, 2021
RT @WWHackinFest: Want to sharpen your abilities to attack, hunt, detect, and defend? Next week @Krelkci and @Rev10D will teach their course, "Applied Purple Teaming." System admins, pentesters, and others may find this class of interest. Learn and register here: https://t.co/SL8g7L0OXg https://t.co/rGzqMq616e
Open
Applied Purple Teaming w/ Kent Ickler & Jordan Drysdale 4 Sessions – 4 Hour Classes

Applied Purple Teaming w/ Kent Ickler & Jordan Drysdale 4 Sessions – 4 Hour Classes

Students will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics, implement Blue Team defensery, and manage an environment …

@bry_campbell shared
On Feb 2, 2021
RT @ESETresearch: #ESETresearch published details about unique malware we’ve named Kobalos targeting multiple operating systems including Linux, FreeBSD and Solaris, and perhaps even AIX and Windows. #KobalosMalware @marc_etienne_ @ulexec 1/6 https://t.co/WLeXCVn9CL https://t.co/d9SlEPiIgQ
Open
Kobalos – A complex Linux threat to high performance computing infrastructure

Kobalos – A complex Linux threat to high performance computing infrastructure

ESET uncovers previously unknown and complex multiplatform malware that goes after high performance computing (HPC) clusters and other high-profile targets.

@CSOonline shared
On Feb 1, 2021
Once-a-year wargames are not enough for effective incident response. Instead, engage in regular drills and challenge biases. Psychologically, it’s a more effective strategy. https://t.co/RiXVJ7PeJY #CISO #securitydrill #cybersecurity #IR #IncidentResponse
Open
How decision-making psychology can improve incident response

How decision-making psychology can improve incident response

Challenging biases and engaging in regular drills can keep your incident response team sharper than once-a-year wargames.

@strandjs shared
On Feb 1, 2021
RT @WWHackinFest: Want to learn more about emulating attacks? Check out "Attack Emulation Tools" by @MrOrOneEquals1 and @OrOneEqualsOne. This training course will run from 2/16 to 2/19. It's not too late to sign up! Learn more and register here: https://t.co/3TT1JC78Kf https://t.co/nwZWlVZEvt
Open
Attack Emulation Tools: Atomic Red Team, CALDERA and More w/ Darin and Carrie Roberts 4 Sessions – 4 Hour Classes

Attack Emulation Tools: Atomic Red Team, CALDERA and More w/ Darin and Carrie Roberts 4 Sessions – 4 Hour Classes

Instructors: Darin and Carrie Roberts Includes: 16 hours of hands-on interactive learning Purple Team tracking and reporting with Vectr Interactive Exercises (Labs) Mitre ATT&CK …

@hrbrmstr shared
On Jan 28, 2021
RT @circl_lu: Our private sector @MISPProject information sharing community is composed of 1267 organisations in Luxembourg and abroad. Organisations are actively sharing threat intelligence and information on a continuous basis. Want to join? contact us https://t.co/ldB38Wwm99 https://t.co/vmpF8icpVE
Open
Postal address

Postal address

CIRCL provides a reliable and trusted single point of contact for any users, companies and organizations in Luxembourg. CIRCL is made of a team of experts, who react promptly and ...