Top news of the week: 12.08.2021.
Mitre Attack
UNC215: Spotlight on a Chinese Espionage Campaign in Israel
We discuss the TTPs of a Chinese espionage group we track as UNC215, and focus on their targeting of Israeli entities.
5 Costly Mistakes in Cyber Incident Response Preparation
Discover five "gotchas" to avoid in preparing for cyber incident response in industrial environments that will save you a significant amount of time and resources when responding to an OT ...
Public Sector Tech Talk E14: Impact of the Cybersecurity Executive Order
The Cybersecurity Executive Order (EO) allows cross-industry business leaders the opportunity to gain insights into new and emerging online threats and learn how to protect valuable data, ...
Detecting Cobalt Strike: Penetration Testers
Even if penetration testers are granted access that circumvents endpoint detections, countermeasures can detect their Cobalt Strike activity in the environment.
5 best practices for designing application logs
Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.
Mapping Your Way To Compliance With Cybersecurity Frameworks
Complying with multiple cybersecurity policy and regulatory frameworks can be difficult. Mapping them to your cybersecurity program makes it easier.
The Gloves Come Off: Incident Responders Turn to Active Defense
If 2020 was the year of island hopping, 2021 is the year of cloud-jacking through public clouds. Learn these tactics to remain vigilant against threats.
The Lazarus Heist: Where Are They Now?
CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security