™

Together is faster: Zeek for vulnerabilities

“There is an open approach that is currently rippling across the infosec industry that could give defenders the acceleration they need.” – John Lambert (Distinguished Engineer, Microsoft)  By Greg Bell, CEO of ...
Blog-25-Mitre-Att&ck-Framework-BLOG

Your Guide to the MITRE ATT&CK Framework for ICS

Learn how security teams can use details about adversary behavior and actions contained in the MITRE ATT&CK Framework for ICS to enhance their security strategies. The post Your Guide to the MITRE ...
Blog-25-Mitre-Att&ck-Framework-BLOG

Your Guide to the MITRE ATT&CK Framework for ICS

Learn how security teams can use details about adversary behavior and actions contained in the MITRE ATT&CK Framework for ICS to enhance their security strategies. The post Your Guide to the MITRE ...

21 cybersecurity products to combat APT29: MITRE weighs in

| | MITRE ATT&CK
Introduction MITRE, a not-for-profit organization based in the US, is best known for its globally accessible knowledge base of cyber adversary strategies and techniques popularly referred to as the... Go on to ...
McAfee MVISION Cloud Becomes First CASB to Map Cloud Threats to MITRE ATT&CK

McAfee MVISION Cloud Becomes First CASB to Map Cloud Threats to MITRE ATT&CK

New Release brings cloud-native attacks and vulnerabilities to the forefront of the SOC, gives enterprises the ability to better discover and proactively act on threats July 27, 2020 12:01 AM Eastern Daylight ...
Security Boulevard
Register Now Button

Aligning MITRE ATT&CK with Advanced Analytics

Over the last few years, the MITRE ATT&CK framework has become one of the most... The post Aligning MITRE ATT&CK with Advanced Analytics appeared first on Gurucul ...
Analyzing Encrypted RDP Connections

Analyzing Encrypted RDP Connections

By Anthony Kasza, Corelight Security Researcher Microsoft’s Remote Desktop Protocol (RDP) is used to remotely administer systems within Windows environments. RDP is everywhere Windows is and is useful for conducting remote work ...

MITRE ATT&CK spotlight: Process injection

| | MITRE ATT&CK
Introduction It is no longer a surprise to discover that attackers have changed their attack methodologies and continue to improve the sophistication of their Tactics, Techniques and Procedures... Go on to the ...

MITRE ATT&CK: System shutdown/reboot

| | MITRE ATT&CK
Introduction When system features are used against the system itself, attackers have a unique opportunity to use the in-built capabilities of a computer to make it do what they want. Everyone knows ...

MITRE ATT&CK: Credential dumping

| | MITRE ATT&CK
Introduction When attackers have established a foothold in a system, one of their primary objectives is typically to find user (or otherwise privileged) credentials — usernames and passwords.... Go on to the ...