Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 13.10.2022.

Bruce Schneier
Information security
Physical security
Security
Orchestration
Fork

@PatrickCMiller shared
On Oct 11, 2022
We Can Save Security Teams From Crushing Workloads. Will We? https://t.co/BjPHCEmyMl
Open
We Can Save Security Teams From Crushing Workloads. Will We?

We Can Save Security Teams From Crushing Workloads. Will We?

Today, the processing of mountain-high stacks of alarms is considered "security." That system is failing customers and the cybersecurity workforce.

@SushiDude shared
On Oct 12, 2022
RT @KeirstenBrager: My husband died 9/27/2022 in Brazil. My statement is posted to his LinkedIn account: https://t.co/o2BQ2LX308 https://t.co/Q9U1yvfTC3
Open
Paul B.’s Post

Paul B.’s Post

This is Paul’s wife Keirsten. He passed away on 9/27/2022 in Brazil. I appreciate your patience as I deal with this sudden tragedy.   FAQs:   What happened? I… | 141 comments on LinkedIn

@CSOonline shared
On Oct 12, 2022
3 actions Latin American leaders must take to reduce risk of cyberattacks https://t.co/BmJHOYiiwv
Open
3 actions Latin American leaders must take to reduce risk of cyberattacks

3 actions Latin American leaders must take to reduce risk of cyberattacks

Threat actors are targeting government and private sector organizations across Latin America, so business and political leaders must step up to meet the challenge.

@PatrickCMiller shared
On Oct 9, 2022
Industry Reactions to Conviction of Former Uber CSO Joe Sullivan: Feedback Friday https://t.co/cUI7uotYnw
Open
Industry Reactions to Conviction of Former Uber CSO Joe Sullivan: Feedback Friday

Industry Reactions to Conviction of Former Uber CSO Joe Sullivan: Feedback Friday

Industry professionals react to the conviction of former Uber CSO Joe Sullivan over his role in covering up the data breach suffered by the ride sharing giant in 2016.

@DarkReading shared
On Oct 11, 2022
RT @otherjimdonahue: "These proposed SEC disclosure requirements present an array of challenges. First and foremost, very few incident investigations are completed within four days." -Jason Hicks, Field CISO @coalfire https://t.co/LawJOo4Qml
Open
Proposed SEC Disclosure Rules Could Transform Cyber-Incident Response

Proposed SEC Disclosure Rules Could Transform Cyber-Incident Response

It's not too early for firms to start preparing for change.

@Mandiant shared
On Oct 12, 2022
Our new Threat Campaigns feature within #MandiantAdvantage Threat Intelligence provides security professionals with a quick way to stay updated on active campaigns affecting their industries & regions. Learn more. ⬇️ https://t.co/VHKcnaNu2J
Open
Gain Visibility Into Attacker Activity with Threat Campaigns

Gain Visibility Into Attacker Activity with Threat Campaigns

Individual and Global Campaigns The addition of Threat Campaigns builds upon the mission of Mandiant Advantage Threat Intelligence: to provide greater visibility into attacker …

@redcanary shared
On Oct 11, 2022
Windows Management Instrumentation made its first top 10 appearance in the 2022 Threat Detection Report. Here are some detection and testing opportunities for WMI. https://t.co/nD97oM6AWf
Open
Windows Management Instrumentation

Windows Management Instrumentation

Windows Management Instrumentation (WMI) is a technique leveraged for lateral movement and discovery. See detection strategies for T1047.

@StaySafeOnline shared
On Oct 12, 2022
Security teams have an uphill battle in today’s threat landscape as they struggle to gain sufficient visibility over their environment while defending a variety of distributed assets. Learn more from @CywareCo: https://t.co/sKMHfNiBCG #BeCyberSmart #CybersecurityAwarenessMonth
Open
Gaining 360-Degree SecOps View to Trounce Cyber Threats with Cyber Fusion

Gaining 360-Degree SecOps View to Trounce Cyber Threats with Cyber Fusion

Security teams have an uphill battle in today’s threat landscape as they struggle to gain sufficient visibility over their environment while defending a variety of distributed assets.