Cybersecurity Essentials

Mitre ATT&CK

The cybersecurity market already top $100 billion per year and will reach $300 billion by 2024. With that kind of money at stake, this market is one of the hottest areas for IT innovation.

Top news of the week: 30.09.2021.

Security guard
Security
Bruce Schneier
Supply chain security
Two-factor authentication
Physical security

Mitre Attack

@PatrickCMiller shared
On Sep 29, 2021
MITRE ATT&CK, VERIS frameworks integrate for better incident insights https://t.co/9qk23vUtzz
Open
MITRE ATT&CK, VERIS frameworks integrate for better incident insights

MITRE ATT&CK, VERIS frameworks integrate for better incident insights

The MITRE ATT&CK/VERIS collaboration aims to create a common dictionary for communicating information about security incidents.

@PatrickCMiller shared
On Sep 30, 2021
How to choose an endpoint protection suite https://t.co/MdEV3Y4961
Open
How to choose an endpoint protection suite

How to choose an endpoint protection suite

Endpoint protection has come a long way since the days of dedicated antivirus servers. Here are the basic and more advanced features to look for in an enterprise endpoint protection suite.

@HackingDave shared
On Sep 27, 2021
RT @stuhlonsky: Hello #DFIR people, since i often have to look up event IDs when doing analyses, i have structured my bookmark collection a bit and put it into a repo. Not much so far. And since that's how you do it today, I hope it turns into an awesome collection. https://t.co/IJCMp6dC6o
Open
Collection of Event ID resources useful for Digital Forensics and Incident Response

Collection of Event ID resources useful for Digital Forensics and Incident Response

Collection of Event ID ressources useful for Digital Forensics and Incident Response - GitHub - stuhli/awesome-event-ids: Collection of Event ID ressources useful for Digital Forensics and ...

@CrowdStrike shared
On Sep 26, 2021
Learn why @CrowdStrike created SuperMem, an open-source Windows memory processing script that helps investigators quickly process memory samples in their investigations: https://t.co/2474oDnamC https://t.co/aQDkdoPEa5
Open
SuperMem: A Free CrowdStrike Incident Response Tool for Automating Memory Image Processing

SuperMem: A Free CrowdStrike Incident Response Tool for Automating Memory Image Processing

Learn why we created SuperMem, an open-source Windows memory processing script that helps investigators quickly process memory samples in their investigations.

@SecurityWeek shared
On Sep 29, 2021
SecurityWeek Cybersecurity News Briefing for September 29th 2021 - https://t.co/qe3O7m8ijp
Open
How to Use NeuVector with the MITRE ATT&CK Framework

How to Use NeuVector with the MITRE ATT&CK Framework

SecurityWeek Briefing: Wednesday, September 29, 2021 Russia Detains Head of Cybersecurity Firm Group-IB | How to Spot an Ineffective Security Practitioner Visit SecurityWeek.Com | Advertise ...

@cybereason shared
On Sep 23, 2021
RT @virusbtn: In their threat-hunting talk at VB2021 #vblocalhost, Cybereason researchers Niv Yona & @elisalem9 describe their timeline from hour 0 of the SolarWinds supply chain attack and Hafnium exploiting the ProxyLogon vulnerability. https://t.co/RKWYbv0Am8 https://t.co/ehdMDJXHSn
Open
Threat hunting: from SolarWinds to Hafnium APT

Threat hunting: from SolarWinds to Hafnium APT

From the latest big events of the year, the SolarWinds supply chain attack and Proxylogon vulnerability exploitation by the Hafnium threat actor, we can learn how threat hunting …

@vmw_carbonblack shared
On Sep 29, 2021
Whether it is via BCC, the manipulation of time or deepfakes, attackers are finding new ways to infiltrate and colonize victims’ infrastructure to make attacks on others in turn. @InfoSecRick highlights key points from @VMware’s Global IR Threat Report: https://t.co/yhSyBfwtFq
Open
Welcome to A New Era of Cyber Illusions

Welcome to A New Era of Cyber Illusions

Cyber attackers have evolved to use manipulation and trickery to distort our data, forcing us to question the basic integrity of our digital reality.

@CrowdStrike shared
On Sep 29, 2021
This @CrowdStrike blog outlines the challenge of traditional log-based security monitoring and how CrowdStrike and Amazon EventBridge enable real-time event-driven detections: https://t.co/NUwZxKrrAV https://t.co/o5D6Fr3NJS
Open
Detect Adversary Behavior in Real Time With CrowdStrike Falcon Horizon and Amazon EventBridge

Detect Adversary Behavior in Real Time With CrowdStrike Falcon Horizon and Amazon EventBridge

This blog outlines the challenge of traditional log-based security monitoring and how CrowdStrike and Amazon EventBridge enable high-speed event-driven detections.