Top news of the week: 16.02.2021.
Mitre Attack
How to harden Microsoft Edge against cyberattacks
Chromium-based Edge gives enterprises the opportunity to standardize on one browser. Here are the key security settings you need to know.
Inside cybersecurity’s shelfware problem
Sometimes underutilization of security software and services is a deliberate, strategic choice; more often it's a cause for concern.
COVID-19 Is Requiring Us to Implement Cyber Distancing (Part 2)
While working from home or even while at work for that matter, follow these steps to avoid behaviors that may let the bad guy in.
We Must Reorient US Cyber Strategy Around the Only Safe Assumption
We should assume adversaries are already in our networks — and Congress should take these five steps to mitigate the damage.
Top 10 Most Used MITRE ATT&CK Tactics & Techniques In 2020
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) is a curated knowledge base and model forcyber adversary behavior, reflecting the various phases of an …
Press #1 to Play: A Look Into eCrime Menu-style Toolkits
Learn how operators can stitch together “freeware” software, security tools and publicly-available exploits in a menu-style script to achieve a high execution tempo.
Striking Back: Hunting Cobalt Strike using Sysmon and Sentinel
Striking Back: Hunting Cobalt Strike using Sysmon and Sentinel Wednesday, February 24 from 1-2pm EST Presented by Binary Defense and TrustedSec Cobalt Strike is a powerful adversary ...
Incident Response Team AMA
Learn more about AMA - IR Team from TrustedSec, the leading US security consulting team.