Cybersecurity Essentials

Mitre ATT&CK

The cybersecurity market already top $100 billion per year and will reach $300 billion by 2024. With that kind of money at stake, this market is one of the hottest areas for IT innovation.

Top news of the week: 09.03.2021.

#HAFNIUM
#PowerShell
#SEC505
#TrustinTech
#community

Mitre Attack

@likethecoins shared
On Mar 3, 2021
RT @meansec: OK. Big thanks to @Volexity and @microsoft for their blogs. If you are looking to detect some of the #HAFNIUM activity in @splunk take a peek here: https://t.co/aTTg9EwPFU
Open
Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk

Detecting HAFNIUM Exchange Server Zero-Day Activity in Splunk

This blog discusses how to detect HAFNIUM activity around the recent CVEs released affecting Exchange Server using Splunk and Splunk Enterprise Security.

@likethecoins shared
On Mar 6, 2021
RT @markus_neis: Don't know where to start? Yara https://t.co/qg7dT59Yt0 Sigma https://t.co/HK4zDDfoso have you covered https://t.co/u85euZvNog
Open
Sigma

Sigma

Generic Signature Format for SIEM Systems. Contribute to SigmaHQ/sigma development by creating an account on GitHub.

@likethecoins shared
On Mar 9, 2021
RT @TheDFIRReport: Bazar Drops the Anchor ➡️C2: Bazar, Anchor, CobaltStrike ➡️Discovery: net, nltest, systeminfo, whoami, reg query, PowerView, Get-DataInfo, etc. ➡️Lateral Movement: RDP, CobaltStrike ➡️Exfiltration: Encrypted exfil, honey docs accessed off network https://t.co/zulo3KrEP8 https://t.co/MkguOnklFF
Open
Bazar Drops the Anchor

Bazar Drops the Anchor

Intro The malware identified as Anchor first entered the scene in late 2018 and has been linked to the same group as Trickbot, due to similarities in code and usage … Read More

@PatrickCMiller shared
On Mar 7, 2021
Multiple Airlines Impacted by Data Breach at Aviation IT Firm SITA https://t.co/RvDuJpg2nP
Open
Multiple Airlines Impacted by Data Breach at Aviation IT Firm SITA

Multiple Airlines Impacted by Data Breach at Aviation IT Firm SITA

A data breach at SITA, a company that specializes in air transport communications and IT, has impacted multiple airlines and hundreds of thousands of their customers.

@PatrickCMiller shared
On Mar 6, 2021
Microsoft Shares Additional Mitigations for Exchange Server Vulnerabilities Under Attack https://t.co/QGuwPTa9Yb
Open
Microsoft Shares Additional Mitigations for Exchange Server Vulnerabilities Under Attack

Microsoft Shares Additional Mitigations for Exchange Server Vulnerabilities Under Attack

Microsoft released alternative mitigation measures for organizations using Exchange Server who have not been able to immediately apply emergency out-of-band patches.

@PatrickCMiller shared
On Mar 6, 2021
Ransomware is a multi-billion industry and it keeps growing https://t.co/L00tmh0mGn
Open
Ransomware is a multi-billion industry and it keeps growing

Ransomware is a multi-billion industry and it keeps growing

An analysis from global cybersecurity company Group-IB reveals that ransomware attacks more than doubled last year and increased in both scale and sophistication.

@SANSDefense shared
On Mar 5, 2021
SEC505 Securing Windows and PowerShell Automation teaches how to use #PowerShell to automate Windows security and harden PowerShell itself. Try the course demo for yourself: https://t.co/RJDjVFRyYq Learn more about #SEC505: https://t.co/MGyPAHN3eY https://t.co/baDdJEl9OG
Open
SEC505: Securing Windows and PowerShell Automation

SEC505: Securing Windows and PowerShell Automation

Designed for security operations team members, SEC505 teaches students how to secure Windows Server and Windows 10 with PowerShell automation.

@HackingDave shared
On Mar 9, 2021
RT @ITPirate: I'm super excited to announce that our next #TrustinTech #community event will be held by my friend @Oddvarmoe from @TrustedSec who will be talking about methods how advanced hackers operate. Wanna join? RSVP here: https://t.co/EXjFyTmNaA
Open
Trust in Tech - How advanced hackers operate

Trust in Tech - How advanced hackers operate

Mi., 7. Apr. 2021, 18:00: You read about it in the news all the time, company X got breached by advanced hackers, hackers gained full control of customer x.How do they manage to get in? How ...