Cybersecurity

Mitre ATT&CK

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 22.12.2022.

Information security
Authentication
Vulnerability
Risk
Security
Supply chain security

@PatrickCMiller shared
On Dec 22, 2022
Organizations Warned of New Attack Vector in Amazon Web Services https://t.co/I0fMnhHFW2
Open
Organizations Warned of New Attack Vector in Amazon Web Services

Organizations Warned of New Attack Vector in Amazon Web Services

Researchers warned that threat actors could potentially exploit Elastic IP transfer and compromise an IP address

@Andrew___Morris shared
On Dec 21, 2022
RT @hrbrmstr: ICYMI yesterday, we (@greynoiseio) dropped our first every annual report on mass exploitation. It's 22 pgs (+ a Timeline of Celebrity Vulns: 10 pages you can print out, tape together, and proudly display on your wall). https://t.co/0ncF6EHP0C
Open
GreyNoise 2022 Mass Exploitation Report

GreyNoise 2022 Mass Exploitation Report

Researchers at GreyNoise Intelligence have added over 230 tags since January 1, 2022, which include detections for over 160 CVEs. In the GreyNoise Intelligence 2022 "Year of Mass Exploits" ...

@PatrickCMiller shared
On Dec 19, 2022
Evolving cyber threats push organizations to chalk out improved incident response, business continuity, disaster recovery plans https://t.co/01epk9udQP
Open
Evolving cyber threats push organizations to chalk out improved incident response, business continuity, disaster recovery plans

Evolving cyber threats push organizations to chalk out improved incident response, business continuity, disaster recovery plans

Evolving cyber threat landscape pushes organizations to chalk out improved incident response, business continuity, disaster recovery plans.

@PatrickCMiller shared
On Dec 21, 2022
NSA report focuses on driving cybersecurity outcomes while pushing strong partnerships and education https://t.co/nUFuOjQpp6
Open
NSA report focuses on driving cybersecurity outcomes while pushing strong partnerships and education

NSA report focuses on driving cybersecurity outcomes while pushing strong partnerships and education

NSA report focuses on driving cybersecurity outcomes, while preventing and eradicating cyber threats by pushing partnerships, education.

@PatrickCMiller shared
On Dec 16, 2022
NSA warns of Chinese hacker group APT5 targeting Citrix ADC vulnerabilities https://t.co/S910ncLPjG
Open
NSA warns of Chinese hacker group APT5 targeting Citrix ADC vulnerabilities

NSA warns of Chinese hacker group APT5 targeting Citrix ADC vulnerabilities

NSA warns of Chinese hacker group APT5 targeting Citrix ADC vulnerabilities, provides defensive techniques against malicious activity.

@msftsecurity shared
On Dec 21, 2022
What are SOCs? (Not to be confused with the wearable kind!) 🧦 Learn about the functions and benefits of SOCs and how they utilize SIEM: https://t.co/IAbyfPjgxJ #SecOps https://t.co/jT1xxFrikl
Open
What is a security operations center (SOC)?

What is a security operations center (SOC)?

Learn how security operations centers (SOC) rapidly detect, prioritize, and triage potential cyberattacks.

@PatrickCMiller shared
On Dec 15, 2022
RT @amperesec: Ampere Industrial Security and Insane Forensics Have Joined Forces to Help Industrial Asset Owners Keep Ahead of Their Adversaries - And Their Auditors https://t.co/NEH9QvIQ8l
Open
Ampere Industrial Security and Insane Forensics Have Joined Forces to Help Industrial Asset Owners Keep Ahead of Their Adversaries - And Their Auditors

Ampere Industrial Security and Insane Forensics Have Joined Forces to Help Industrial Asset Owners Keep Ahead of Their Adversaries - And Their Auditors

/PRNewswire/ -- Ampere Industrial Security partners with Insane Forensics to offer the widest possible range of cybersecurity and compliance services for...

@HackingDave shared
On Dec 20, 2022
RT @TrustedSec: Mid-market companies and SMBs have different security program challenges than large enterprises but still face many of the same threats. @quietmike8192 describes how to accelerate your #security with a clear roadmap & hands-on security engineering support. https://t.co/M2223coCq5
Open
Building a Strong Foundation With the Information Security Accelerator

Building a Strong Foundation With the Information Security Accelerator

TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.