Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 02.06.2022.

#AMA
#Microsoft
#Follina
#phishing
#casestudy
#XDR
#infosec

@PatrickCMiller shared
On Jun 1, 2022
New Microsoft Zero-Day Attack Underway https://t.co/7Xy6O0HteQ
Open
New Microsoft Zero-Day Attack Underway

New Microsoft Zero-Day Attack Underway

"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially crafted Office documents.

@jaysonstreet shared
On May 26, 2022
RT @scythe_io: Not too late to sign up for this #AMA with @MalwareJake at 1pm EDT today! Jake will dive into some really interesting questions - don't miss out. https://t.co/xMOACk0bZH
Open
Register for an AMA with Jake Williams, Executive Director of Cyber Threat Intelligence

Register for an AMA with Jake Williams, Executive Director of Cyber Threat Intelligence

Here's your chance to ask Jake Williams anything! Jake is a cybersecurity expert with two decades of experience in secure network design, penetration testing, incident response, forensics ...

@PatrickCMiller shared
On Jun 2, 2022
Ransomware attacks need less than four days to encrypt systems https://t.co/4vQoyuiy7c
Open
Ransomware attacks need less than four days to encrypt systems

Ransomware attacks need less than four days to encrypt systems

The duration of ransomware attacks in 2021 averaged 92.5 hours, measured from initial network access to payload deployment. In 2020, ransomware actors spent an average of 230 hours to ...

@strandjs shared
On Jun 1, 2022
RT @BHinfoSecurity: **NEW** BHIS | Tester's Blog Impacket Offense Basics With an Azure Lab by: @Rev10D Published: 6/1/2022 https://t.co/6SXnSFt3oM
Open
Impacket Offense Basics With an Azure Lab

Impacket Offense Basics With an Azure Lab

Jordan Drysdale // Overview The following description of some of Impacket’s tools and techniques is a tribute to the authors, SecureAuthCorp, and the open-source effort to maintain and ...

@CrowdStrike shared
On May 31, 2022
During a holiday weekend, an active adversary used compromised credentials to access an unprotected system via RDP. Learn how the Falcon Complete team’s 24/7 security monitoring enabled them to contain and remediate the threat in a matter of minutes: https://t.co/0z11NX6TqQ https://t.co/MdCaVB7EXT
Open
Falcon Complete Managed Detection and Response Casebook

Falcon Complete Managed Detection and Response Casebook

This incident report casebook demonstrates the power of Falcon Complete’s combination of people, process and technology.

@meansec shared
On Jun 1, 2022
Today got away from me, but great work from @DrShannon2000 getting a quick blog out with Splunkspiration on #Follina https://t.co/UWgDwvXvHq And the STRT from @splunk crushed it and already has analytic stories (linked in the blog) for your ESCU needs!
Open
RCE à La Follina (CVE-2022-30190)

RCE à La Follina (CVE-2022-30190)

The Splunk SURGe team offers a closer look into the Follina MS Office RCE, including a breakdown of what happened, how to detect it, and MITRE ATT&CK mappings.

@HackingDave shared
On May 27, 2022
RT @cantcomputer: New @TrustedSec Job Posting: Technical Solutions Consultant https://t.co/AuqSjUnGBT
Open
Who Is TrustedSec?

Who Is TrustedSec?

We’re always looking for industry experts or support team members who are passionate about making this world a safer place. Are you interested in joining our team? Find out more.

@cybereason shared
On Jun 1, 2022
Spear phishing tactics are increasing in sophistication, should this raise concern? Read this technical case study for #XDR and see why traditional tools just won't cut it https://t.co/sqSu6rkckR #casestudy #phishing #infosec
Open
Spear Phishing: A Technical Case Study for XDR

Spear Phishing: A Technical Case Study for XDR

Unlike more traditional tools, an XDR solution cuts through the noise to deliver efficiency through context-rich correlations that leverage all of an organizations’ security telemetry from ...