Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 05.05.2022.

#IBM
#incidentresponse
#webinar
#Winnti
#malwareanalysis
#research
#CuckooBees
#UNC2903
#SCWX
#cybersecurity

Mitre Attack

@PatrickCMiller shared
On May 4, 2022
Security Stuff Happens: What Do You Do When It Hits the Fan? https://t.co/lmrYz9VgsJ
Open
Security Stuff Happens: What Do You Do When It Hits the Fan?

Security Stuff Happens: What Do You Do When It Hits the Fan?

Breaches can happen to anyone, but a well-oiled machine can internally manage and externally remediate in a way that won't lead to extensive damage to a company's bottom line. (Part 1 of a ...

@PatrickCMiller shared
On May 3, 2022
Cybersecurity M&A Roundup: 42 Deals Announced in April 2022 https://t.co/hEfDeVMDmP
Open
Cybersecurity M&A Roundup: 37 Deals Announced in April 2022

Cybersecurity M&A Roundup: 37 Deals Announced in April 2022

37 cybersecurity-related merger and acquisition (M&A) deals were announced in April 2022.

@cybereason shared
On May 2, 2022
If you missed our webinar with @IBMSecurity - catch it on-demand. Solving the Incident Response Data Problem 👉 learn defenses and response tactics and techniques https://t.co/yIOW0zqp72 #webinar #IBM #incidentresponse
Open
Solving the Incident Response (IR) Data Problem

Solving the Incident Response (IR) Data Problem

Join Cybereason’s Jim Hung and IBM’s Head of Research for X-Force John Dwyer, as they discuss the current state of Incident Response (IR), and demonstrate how a combination of IBM X-Force’s ...

@cybereason shared
On May 4, 2022
RT @campuscodi: Cybereason has a long report out on a years-long Chinese hacking operation focused on IP theft from tech and manufacturing companies in East Asia, Western Europe & North America https://t.co/0o0dk8zZwH TTP report: https://t.co/w9sVYM50LX Malware report: https://t.co/IIHixQ4ppX https://t.co/GIY6EPcwFt
Open
Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques

Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques

Cybereason investigated multiple intrusions targeting technology and manufacturing companies located in Asia, Europe and North America. Based on the findings of our investigation, it ...

@PatrickCMiller shared
On May 3, 2022
Why Intelligence Based Detections in ICS Fail https://t.co/rnmEt0xQTO
Open
Why Intelligence Based Detections in ICS Fail

Why Intelligence Based Detections in ICS Fail

Threat intelligence plays an integral role in cybersecurity, but industrial control system (ICS) environments offer unique challenges. Let's dig into the basics of intelligence-based ...

@cybereason shared
On May 4, 2022
RT @CR_Nocturnus: https://t.co/CSBlAOOuMf https://t.co/OoTQuPqv1W https://t.co/66BlJ6pjiC https://t.co/HKvdNRoqha
Open
Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive

Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive

This research zeroes in on the Winnti malware arsenal and includes analysis of the observed malware and the complex Winnti infection chain, including evasive maneuvers and stealth ...

@Mandiant shared
On May 4, 2022
Our latest blog describes how #UNC2903 performed exploitation & cloud metadata abuse, as well as related best practices on cloud hardening techniques. Read more 👇 https://t.co/ggfZ7BJ6yu
Open
Old Services, New Tricks: Cloud Metadata Abuse by UNC2903

Old Services, New Tricks: Cloud Metadata Abuse by UNC2903

Mandiant identified exploitation of public-facing web applications by UNC2903 to harvest and abuse AWS credentials.

@Secureworks shared
On May 2, 2022
A recent #SCWX survey highlighted 52% of respondents agree understanding business needs is a priority when purchasing a #cybersecurity solution. Do you agree? ✍️ Learn more: https://t.co/BXcWHhteKd https://t.co/JWWiLvIYnC
Open
Cybersecurity Services

Cybersecurity Services

Intelligence-driven information security services and solutions to help organizations predict, prevent, detect and respond rapidly to cyberattacks.