Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 15.09.2022.

Cloud computing
Bruce Schneier
Information security
Military intelligence
Shell
Participation

@redcanary shared
On Sep 13, 2022
“You’d be hard-pressed to find anyone in cyberthreat intelligence that hasn’t learned from @likethecoins,” -- @selenalarson Congratulations Katie! Thanks to @KyleAlspach for this insightful look into Katie’s impact on the security community. https://t.co/rfYzPe0JmN
Open
How Katie Nickels helped transform how we talk about cyber defense

How Katie Nickels helped transform how we talk about cyber defense

Nickels possesses "superpowers" when it comes to explaining complex subjects in cybersecurity, according to members of the security community.

@likethecoins shared
On Sep 14, 2022
RT @Mandiant: In July 2022, Mandiant Managed Defense identified a novel spear phish methodology employed by a threat cluster tracked as UNC4034. Read our blog to learn more. ⬇️ https://t.co/6xj3YVa7VQ
Open
It's Time to PuTTY! DPRK Job Opportunity Phishing via WhatsApp

It's Time to PuTTY! DPRK Job Opportunity Phishing via WhatsApp

The Managed Defense Threat Hunting Mindset One of the cornerstones of the Mandiant Managed Defense service offering is its proactive threat hunting program that protects our …

@daveherrald shared
On Sep 12, 2022
RT @Mandiant: Google completed its acquisition of Mandiant today. We’re excited to get started on our shared mission to create a comprehensive and best-in-class cyber security solution for customers and partners. Read more here: https://t.co/JpkOHify14 https://t.co/yMCP7qH1MB
Open
Google Completes Acquisition of Mandiant

Google Completes Acquisition of Mandiant

5 mins read MOUNTAIN VIEW, Calif. and RESTON, Va. (September 12, 2022)—Google LLC today announced the completion of its acquisition of Mandiant, Inc. (NASDAQ: MNDT), a recognized …

@Mandiant shared
On Sep 12, 2022
ICYMI: Google completed its acquisition of Mandiant today. Read more about what this means and a few plans around the go forward. https://t.co/XeFSveKclx via @markharanas @CRN
Open
Google Completes Mandiant Acquisition To ‘Reinvent Security’

Google Completes Mandiant Acquisition To ‘Reinvent Security’

Google acquires Mandiant for a $5.4 billion cybersecurity buy to significantly boost its security around threat intelligence and cyber attacks, says CEOs Thomas Kurian and Kevin Mandia.

@PatrickCMiller shared
On Sep 13, 2022
North Korean state-sponsored hacker group Lazarus adds new RAT to its malware toolset https://t.co/5HqB9nHRuT
Open
North Korean state-sponsored hacker group Lazarus adds new RAT to its malware toolset

North Korean state-sponsored hacker group Lazarus adds new RAT to its malware toolset

Lazarus has used the new remote access Trojan in campaigns that exploit the Log4Shell vulnerability and target energy companies.

@CrowdStrike shared
On Sep 13, 2022
Adversaries have nowhere to hide. Get the 2022 Falcon OverWatch Threat Hunting Report, for real-world expert insights that can inform your security strategies in the months ahead. Download the report: https://t.co/4U0ZuULwOq https://t.co/kXI1KGCNKm
Open
2022 Falcon OverWatch Threat Hunting Report

2022 Falcon OverWatch Threat Hunting Report

In this report, the CrowdStrike's threat hunting team provides an exclusive look into the adversary tradecraft and tooling they observed this year.

@Unit42_Intel shared
On Sep 9, 2022
When a software and services provider got locked out of their entire #cloud environment, their business came to a halt. Read the case study to see how Unit 42 helped investigate and respond to the Lapsus$ incident. https://t.co/DB555RAjQf #IncidentResponse #SecuredbyPANW https://t.co/R0nqMYgcng
Open
Restoring a software and services provider’s cloud environment after a breach

Restoring a software and services provider’s cloud environment after a breach

A threat actor brought a software and services provider’s business to a halt by locking it out of its network and deleting its entire cloud environment, including email. That’s when the ...

@HackingDave shared
On Sep 13, 2022
RT @TrustedSec: Find out how Senior IR Consultant Nick Gilberti @lo0pback measures the performance of organizations when delivering a tabletop exercise. Read it now on our blog. https://t.co/NmCutlp7vP
Open
How Your Team’s Culture Determines the Value of Your Tabletop Exercise

How Your Team’s Culture Determines the Value of Your Tabletop Exercise

TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.