Cybersecurity

Mitre ATT&CK

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 15.12.2022.

GlobalSign
English-language films
E-mail
Code signing
Iran
Corporation

@Mandiant shared
On Dec 13, 2022
Check out our latest blog post, released in coordination w/ @SentinelOne, detailing our investigation into malicious drivers signed via the Windows Hardware Compatibility Program. https://t.co/CnRld0byyh
Open
I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware

I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware

Certificate Subject Common Name 2022-06-02 10:09:08 20220811 13:27:00 10f3679384a03cb487bda9621ceb5f90 Zhuhai liancheng Technology Co., Ltd. 2022-06-02 10:09:08 …

@PatrickCMiller shared
On Dec 14, 2022
Amid Outrage, Rackspace Sends Users Email Touting Its Incident Response https://t.co/nYm0zq5U4d
Open
Amid Outrage, Rackspace Sends Users Email Touting Its Incident Response

Amid Outrage, Rackspace Sends Users Email Touting Its Incident Response

More than 10 days after a ransomware attack, affected Rackspace customers are being told the incident had a "limited impact," and have been invited to a webinar for additional details.

@PatrickCMiller shared
On Dec 14, 2022
Twitter Responds to Recent Data Leak Reports https://t.co/aY4UriPRqo
Open
Twitter Responds to Recent Data Leak Reports

Twitter Responds to Recent Data Leak Reports

Twitter has responded to recent data leak reports, confirming that the exposed information is the same as the one leaked earlier this year.

@PatrickCMiller shared
On Dec 12, 2022
Government to Fund Security Studies for Hundreds of Students https://t.co/N9GooQsrLg
Open
@Mandiant shared
On Dec 13, 2022
RT @SentinelOne: 👉 New on #SentinelLabs: Our research reveals threat actors using malicious drivers signed by Microsoft to bypass security defenses. We uncovered the use of #POORTRY and #STONESTOP malware designed to terminate AV and EDR processes. With @Mandiant https://t.co/FwXDcuWUGP
Open
Driving Through Defenses | Targeted Attacks Leverage Signed Malicious Microsoft Drivers

Driving Through Defenses | Targeted Attacks Leverage Signed Malicious Microsoft Drivers

Threat actors are abusing legitimately signed Microsoft drivers in active intrusions into telecommunication, BPO, MSSP, and financial services businesses.

@PatrickCMiller shared
On Dec 11, 2022
Iranian APT Targets US With Drokbk Spyware via GitHub https://t.co/k6866RzwxL
Open
Iranian APT Targets US With Drokbk Spyware via GitHub

Iranian APT Targets US With Drokbk Spyware via GitHub

The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a "dead-drop resolver" to more easily evade detection.

@CrowdStrike shared
On Dec 15, 2022
With the end of the year fast approaching, many of us are looking forward to a well-deserved break. However, security practitioners and security leaders worldwide are bracing themselves for what has become a peak period for novel and disruptive threats. https://t.co/mLCcGoSevX
Open
Why Managed Threat Hunting Should Top Every CISO’s Holiday Wish List

Why Managed Threat Hunting Should Top Every CISO’s Holiday Wish List

This blog examines the value an organization can derive from effective threat hunting operations. Read to learn more!

@likethecoins shared
On Dec 9, 2022
RT @TalosSecurity: Since August 2022, we have seen an increase in infections of Truebot. Read our latest research here: https://t.co/4cxPsFUyB1 https://t.co/FwuQbfqGA5
Open
Breaking the silence - Recent Truebot activity

Breaking the silence - Recent Truebot activity

Since August 2022, we have seen an increase in infections of Truebot (aka Silence.Downloader) malware. Truebot was first identified in 2017 and researchers have linked it to a threat actor ...