This Thursday, March 7, 2019, I’ll be facilitating a Learning Lab titled Fine Tuning Your Cyber-Defense Technologies with the ATT&CK…
Over the past few years, I’ve had the pleasure of welcoming interns on our security research team. One of my goals…
Most malware these days has some level of Command and Control. This can be to exfiltrate data, tell the malware…
Once an attacker has established access and pivoted around to the point of gathering the necessary data, they will work…
The Collection tactic outlines techniques an attacker will undertake in order to find and gather the data they need to…
It will be rare that an attacker exploits a single system and does not attempt any lateral movement within the…
The Discovery tactic is one which is difficult to defend against. It has a lot of similarities to the Reconnaissance…
There’s no doubt about it, attackers want your credentials more than anything, especially administrative credentials. Why burn a zero-day or…
This tactic has the most techniques of any of the other tactics discussed in the MITRE ATT&CK Framework so far.…
Anyone who has had any experience on the offensive side of security has had fun with privilege escalation. There’s something…