Cybersecurity Essentials

Mitre ATT&CK

The cybersecurity market already top $100 billion per year and will reach $300 billion by 2024. With that kind of money at stake, this market is one of the hottest areas for IT innovation.

Top news of the week: 12.08.2021.

#WWTPublicSector
#Cybersecurity
#CTU
#XDR
#CobaltStrike
#medicaldevicesecurity
#CISBenchmarks
#CISControls
#Lazarus
#TheLazarusHeist

Mitre Attack

@Mandiant shared
On Aug 10, 2021
Since 2019, we have identified several intrusions by Chinese espionage group UNC215 in the Middle East, Europe, Asia, and North America. Read our latest blog to learn more about the group's TTPs & intrusion activity directed at Israeli organizations. ⤵️ https://t.co/ZKoeg35ZA7
Open
UNC215: Spotlight on a Chinese Espionage Campaign in Israel

UNC215: Spotlight on a Chinese Espionage Campaign in Israel

We discuss the TTPs of a Chinese espionage group we track as UNC215, and focus on their targeting of Israeli entities.

@RobertMLee shared
On Aug 12, 2021
RT @hacks4pancakes: @BeyondMark https://t.co/hV231nCHHQ
Open
5 Costly Mistakes in Cyber Incident Response Preparation

5 Costly Mistakes in Cyber Incident Response Preparation

Discover five "gotchas" to avoid in preparing for cyber incident response in industrial environments that will save you a significant amount of time and resources when responding to an OT ...

@Mandiant shared
On Aug 12, 2021
Tune in tomorrow as Stacy O’Mara and Ron Bushar join @wwt_inc as part of the #WWTPublicSector Tech Talk Series, for a discussion about the #Cybersecurity Executive Order and how it could affect you. Register ⤵️ https://t.co/XfMeeKyexl
Open
Public Sector Tech Talk E14: Impact of the Cybersecurity Executive Order

Public Sector Tech Talk E14: Impact of the Cybersecurity Executive Order

The Cybersecurity Executive Order (EO) allows cross-industry business leaders the opportunity to gain insights into new and emerging online threats and learn how to protect valuable data, ...

@Secureworks shared
On Aug 12, 2021
How quickly can you detect and contain intrusions before treat actors achieve their goals? Taegis #XDR can help! SCWX Counter Threat Unit (#CTU) explains countermeasures that can detect #CobaltStrike activity in the environment. Learn more: https://t.co/e6nkNJxx10 https://t.co/AMMJP9u75y
Open
Detecting Cobalt Strike: Penetration Testers

Detecting Cobalt Strike: Penetration Testers

Even if penetration testers are granted access that circumvents endpoint detections, countermeasures can detect their Cobalt Strike activity in the environment.

@CSOonline shared
On Aug 11, 2021
How one woman’s quest to solve an application log problem with her implanted cardiac device led to a movement that aims to help everyone build better logs. https://t.co/I0SeLVnIDb @Po1Zon_P1x13 @AFiscutean #medicaldevicesecurity
Open
5 best practices for designing application logs

5 best practices for designing application logs

Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.

@CISecurity shared
On Aug 11, 2021
Regulatory frameworks and standards explain "what" you need to do to achieve compliance; the organizational policies and workflows of the #CISControls, plus the detailed configuration checks of #CISBenchmarks, show you "how." https://t.co/2vRkQgg48u
Open
Mapping Your Way To Compliance With Cybersecurity Frameworks

Mapping Your Way To Compliance With Cybersecurity Frameworks

Complying with multiple cybersecurity policy and regulatory frameworks can be difficult. Mapping them to your cybersecurity program makes it easier.

@vmw_carbonblack shared
On Aug 10, 2021
“We’ve reached a new era of cyber offense and defense.” 81% of IR pros are willing to leverage active defense techniques, ranging from deception to disruption, to combat new attacker methods. @TAKellermann explains ⬇️ https://t.co/KNuu78FwiM
Open
The Gloves Come Off: Incident Responders Turn to Active Defense

The Gloves Come Off: Incident Responders Turn to Active Defense

If 2020 was the year of island hopping, 2021 is the year of cloud-jacking through public clouds. Learn these tactics to remain vigilant against threats.

@runasand shared
On Aug 10, 2021
RT @BushidoToken: New Blog: The Lazarus Heist: Where Are They Now? After thoroughly enjoying #TheLazarusHeist podcast by @geoffwhite247 and @newsjean I revisited the #Lazarus group in a blog and discussed what sort of APT campaigns they are running now. Enjoy! https://t.co/plF6MxBxmv https://t.co/2bVXKmiEbn
Open
The Lazarus Heist: Where Are They Now?

The Lazarus Heist: Where Are They Now?

CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security