Top news of the week: 24.07.2020.

#ThreatHunting #ThreatIntelligence #Explainable #TitaniumPlatform #ThreatIntelligenceSummit #Threats #Sysmon #webinar

Mitre Attack

On Jul 21, 2020
@Mandiant shared
Did you know you can automate the use of the @MITREattack Framework through Mandiant Security Validation? It provides visibility into exactly how your security controls are performing and creates a clear path to optimization. Learn more: https://t.co/9xFxkcMSf6 https://t.co/ohrYANcQoD
Open

Mandiant Security Validation Offers Automated Evaluation of Security Controls Against MITRE ATT&CK Framework

Mandiant Security Validation Offers Automated Evaluation of Security
Controls Against MITRE ATT&CK Framework

Mandiant Security Validation provides continuous testing aligned with MITRE ATT&CK to accelerate improvements to detection and prevention capabilities.

On Jul 20, 2020
@PatrickCMiller shared
Hackers Accessed, Downloaded Twitter User Data in Recent Attack https://t.co/gd4W42nwFh
Open

Hackers Accessed, Downloaded Twitter User Data in Recent Attack

Hackers Accessed, Downloaded Twitter User Data in Recent Attack

Social media platform Twitter has confirmed that attackers downloaded user data from some of the accounts compromised in last week’s security incident

On Jul 19, 2020
@HackingDave shared
RT @briankrebs: Twitter w/ more info on hack. A "small #" of employees "manipulated." 130 accounts targeted, succeeded in tweeting from 45 of them & may have been able to view additional info (read: DMs). On 8 accounts, d/l'd account history using Your Twitter Data tool. https://t.co/zqm7JkxDXm
Open

An update on our security incident

An update on our security incident

An update on our security incident and what we know so far.

On Jul 17, 2020
@ForbesTech shared
https://t.co/PrcBHooelt
Open
On Jul 23, 2020
@PatrickCMiller shared
RT @digitalbond: Check out my latest article: ICS Malware? https://t.co/XVcKEcRgB1 There are many articles on ICS related cyber incidents. 90% are not worth your time. This week's article goes into the questions I ask to determine if it is noteworthy and then into the future of ICS ransomware.
Open

ICS Malware?

ICS Malware?

Cyber incidents that impact a company with important ICS typically generates multiple articles, if the information is disclosed or leaks out. I quickly scan to answer a series of questions ...

On Jul 23, 2020
@SecurityWeek shared
RT @ReversingLabs: Join #ThreatIntelligenceSummit on July 23 and hear from Chip Epps, ReversingLabs Director of Product & Solutions, with a The Top 5 #ThreatHunting Best Practices session at 1:30 PM ET: https://t.co/Nkx4C2VUUv #TitaniumPlatform #Explainable #ThreatIntelligence w/ @SecurityWeek https://t.co/ubd3gi4yGQ
Open

Threat Intelligence Summit

Threat Intelligence Summit

Join ReversingLabs as we lead a session on examining the next generation of explainable threat intelligence solutions and how ReversingLabs has taken a fresh look at the file upload space.

On Jul 23, 2020
@HackingDave shared
RT @Binary_Defense: Join us for our webinar "Following Breadcrumbs: Tracking #Threats with Sysmon". Along with a little bit of #ThreatHunting, this #webinar intends to show how to make the most of the opportunities #Sysmon can provide. https://t.co/4552kE2WtZ
Open

Following Breadcrumbs: Tracking Threats with Sysmon

Following Breadcrumbs: Tracking Threats with Sysmon

Following Breadcrumbs: Tracking Threats with Sysmon Date: Wednesday, July 29th 2020 from 12-1pm EDT Sysmon can allow you to improve your decision-making by offering you a glimpse into what ...

On Jul 23, 2020
@strandjs shared
RT @vanjasvajcer: I have been following this Monero mining and password stealing botnet for some time. Here is what I found https://t.co/K5Dy2XyWAJ https://t.co/AsHVUqfxDU
Open

Prometei botnet and its quest for Monero

Prometei botnet and its quest for Monero

A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group