ATT&CK with Sub-Techniques is Now Live: The what, why, and how to leverage sub-techniques.
Preprocessing of Sysmon Events, in order to use them as input of Recurrent Neural Network (RNN) model.
A POC Remote Desktop (RDP) session hijack utility for disconnected sessions - bohops/SharpRDPHijack
Cheat sheets can be handy for penetration testers, security analysts, and for many other technical roles. They provide best practices, shortcuts, and other ideas that save defenders a lot ...
Learn more about Webinar - MITRE ATT&CK™ Solutions Update and Evolution: Exploring Advanced Applications of ATT&CK from TrustedSec, the leading US security consulting team.
16th July 2020 at 3:00pm - 4:30pm BST Virtual Event - Details to be provided upon registration EDR and threat hunting provide an unprecedented level of visibility into your …
Learn More August 5 | On-Demand Mitigating Cyber Escalation: Modernizing Cybersecurity with Intrinsic Security Join Tom Kellermann and Greg Foss from VMware Carbon Black as they …
Conti is a new family of ransomware observed in the wild by the Carbon Black Threat Analysis Unit (TAU). Unlike most ransomware, Conti contains unique features that separate it in terms of ...