Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 03.02.2022.

#SolarWinds
#OT
#ransomware
#Russia
#crypto
#MISA
#MalOp
#XDR
#ZeroTrust
#cybersecurity

Mitre Attack

@Mandiant shared
On Feb 1, 2022
In our research, Mandiant analysts downloaded and parsed through terabytes of dump data and found a substantial amount of sensitive OT documentation. https://t.co/FHuu9IE3cZ via @DarkReading
Open
Mandiant: 1 in 7 Ransomware Extortion Attacks Exposes OT Data

Mandiant: 1 in 7 Ransomware Extortion Attacks Exposes OT Data

Analysis of "shaming site" data dumps found sensitive documentation from OT organizations, including oil and gas.

@Mandiant shared
On Feb 1, 2022
The #SolarWinds incident put supply chains on alert, bringing to light the far-reaching impact of these attacks. https://t.co/S9NdQskA8J via @DarkReading
Open
Navigating Nobelium: Lessons From Cloud Hopper & NotPetya

Navigating Nobelium: Lessons From Cloud Hopper & NotPetya

Nearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats.

@DarkReading shared
On Jan 31, 2022
RT @otherjimdonahue: "Cryptography and quantum computing are on a collision course that will threaten" public key cryptography, the "cornerstone technology underlying cybersecurity." -David Ott and @seanjhuntley @VMware @DarkReading https://t.co/NYjVgaK3LS
Open
Crypto Agility: Solving for the Inevitable

Crypto Agility: Solving for the Inevitable

The advent of viable quantum computers will threaten today’s encryption standards, which are the basis of Internet security. Cryptographic agility is the key to post-quantum computing ...

@msftsecurity shared
On Feb 2, 2022
RT @PicusSecurity: We are excited to announce that Picus has joined the @msftsecurity Intelligent Security Association (#MISA). The Platform now helps security teams achieve the best possible protection from Microsoft Defender for Endpoint and Microsoft Sentinel. Learn more: https://t.co/ElQuyJeNj7
Open
Picus Security Joins Microsoft Intelligent Security Association (MISA)

Picus Security Joins Microsoft Intelligent Security Association (MISA)

The Picus Complete Security Control Validation Platform enables security teams to achieve the best possible protection from Microsoft Defender for Endpoint and Microsoft Sentinel

@strandjs shared
On Feb 2, 2022
RT @Antisy_Training: We have a session of "Applied Purple Teaming" w/@Krelkci & @Rev10D, Feb. 22-25! Students will demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework, Red Team tactics & Blue Team defenses to identify, slow, & stop attacks. Register here:https://t.co/4cInI2ljfq https://t.co/VSajfhVzrl
Open
Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale

Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale

Students will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics, implement Blue Team defensery, and manage an environment …

@redcanary shared
On Feb 2, 2022
Red Canary can integrate with your Microsoft Sentinel environment in just a few minutes, arming you with correlated data from both tools. https://t.co/shQET4kRYw
Open
Streamline your workflow with Red Canary’s Microsoft Sentinel integration

Streamline your workflow with Red Canary’s Microsoft Sentinel integration

Correlate Microsoft Sentinel data and Red Canary detections in either platform with our new purpose-built integration.

@MISPProject shared
On Feb 1, 2022
The MISP project website has been revamped and improved. https://t.co/13hPGplwrj Thanks to all the contributor (especially @cvandeplas for the hard work) and @GoHugoIO . Don't hesitate to make pull-requests and updates on the website repo. https://t.co/UuETzdTwF5
Open
@cybereason shared
On Feb 2, 2022
What is Zero Trust? Discover how Cybereason #XDR addresses all of these challenges across the five core pillars of zero trust https://t.co/MHQGp2twH5 #MalOp #cybersecurity #ZeroTrust https://t.co/Ji2g81XHtN
Open
How Cybereason XDR Supports Zero Trust Initiatives

How Cybereason XDR Supports Zero Trust Initiatives

Cybereason XDR addresses the five core pillars of Zero Trust: device, identity, network, application workload and data...