Cybersecurity

Mitre ATT&CK News

Explore the latest news articles and reports about the Mitre Attack Framework, a curated knowledge base that helps network defenders learn exactly how networks are attacked. Discover everything about it and its place in the world of cybersecurity.

Top news of the week: 30.06.2022.

Risk
Security
Computer security
United States Coast Guard
Breach
Network switch

@PatrickCMiller shared
On Jun 25, 2022
APT Groups Swarming on VMware Servers with Log4Shell https://t.co/Ytl1vzbuKQ
Open
APT Groups Swarming on VMware Servers with Log4Shell

APT Groups Swarming on VMware Servers with Log4Shell

CISA tells organizations running VMware servers without Log4Shell mitigations to assume compromise.

@PatrickCMiller shared
On Jun 29, 2022
It's a Race to Secure the Software Supply Chain — Have You Already Stumbled? https://t.co/D8ZkzW37yv
Open
It's a Race to Secure the Software Supply Chain — Have You Already Stumbled?

It's a Race to Secure the Software Supply Chain — Have You Already Stumbled?

If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.

@PatrickCMiller shared
On Jun 30, 2022
ZuoRAT Hijacks SOHO Routers From Cisco, Netgear https://t.co/jaVxclfnZ6
Open
ZuoRAT Hijacks SOHO Routers From Cisco, Netgear

ZuoRAT Hijacks SOHO Routers From Cisco, Netgear

The malware has been in circulation since 2020, with sophisticated, advanced malicious actors taking advantage of the vulnerabilities in SOHO routers as the work-from-home population ...

@Mandiant shared
On Jun 27, 2022
"Until it is not the lucrative business that it is today, it's not going away." - @JumpforJoyce on multifaceted extortion. Read @TheRegister for more on this trend and some of the other tactics criminals are using to get companies to pay ransom. https://t.co/LN4hVQzNJ9
Open
We're now truly in the era of ransomware as pure extortion without the encryption

We're now truly in the era of ransomware as pure extortion without the encryption

Why screw around with cryptography and keys when just stealing the info is good enough

@Mandiant shared
On Jun 29, 2022
“A strong defense-in-depth approach for #ICS will help prevent or minimize the impact no matter the source or the type of incident." Read more from @chrissistrunk who spoke to @IndustCybersec about layering defense-in-depth within ICS environments. https://t.co/ImByXTRMfz
Open
Mounting cybersecurity threats push the need to layer defense-in-depth approach in industrial environments

Mounting cybersecurity threats push the need to layer defense-in-depth approach in industrial environments

Mounting cybersecurity threats push the need to layer defense-in-depth approach across industrial, OT/ICS environments.

@olafhartong shared
On Jun 28, 2022
RT @MITREattackDef: Check out the new ATT&CK Powered Suit Chrome extension! It lets you instantly search @MITREattack techniques, groups, and more, without disrupting workflows. Thanks to the Center for Threat-Informed Defense & @fujitsu: https://t.co/GBJn757Nia https://t.co/cdPqnLkc3K
Open
Put MITRE ATT&CK® at Your Fingertips

Put MITRE ATT&CK® at Your Fingertips

Written by Mark E. Haase and Jon Baker.

@CrowdStrike shared
On Jun 29, 2022
Learn how the Falcon OverWatch Elite team effectively hunts and contains sophisticated cyber threat actors using expertise and ingenuity of human threat hunters in this blog post. ⬇️ https://t.co/Z7Vifvi23v
Open
Falcon OverWatch Elite in Action: Tailored Threat Hunting Services Provide Individualized Care and Support

Falcon OverWatch Elite in Action: Tailored Threat Hunting Services Provide Individualized Care and Support

Learn how the Falcon OverWatch Elite team effectively hunts and contains sophisticated cyber threat actors using expertise and ingenuity of human threat hunters.

@DarkReading shared
On Jun 29, 2022
Cyberattacks via Unpatched Systems Cost Orgs More Than Phishing: https://t.co/R0x8cLJcab by @roblemos
Open
Cyberattacks via Unpatched Systems Cost Orgs More Than Phishing

Cyberattacks via Unpatched Systems Cost Orgs More Than Phishing

External attacks focused on vulnerabilities are still the most common ways that companies are successfully attacked, according to incident data.