MITRE ATT&CK version 13

MITRE-ATTCK

MITRE ATT&CK version 13 has been recently launched, bringing some significant updates. These include: ATT&CK version 13 for Enterprise includes 14 tactics, 196 techniques, 411 sub-techniques, 138 groups, b22 campaigns, and 740 software pieces. The upcoming version 14, set to release in October, will further enhance the coverage across domains, introduce renovated mitigations, new cross-domain… Continue reading MITRE ATT&CK version 13

Leading DLP Solutions: Maximizing Data Protection

Data Loss Prevention

As data breaches continue to rise, it’s vital for organizations to implement and maintain effective Data Loss Prevention (DLP) solutions. Leading DLP solutions offer comprehensive protection by monitoring and controlling data flow, identifying sensitive information, and enforcing policies to prevent leaks. With the right implementation and configuration, businesses can maximize data protection and avoid costly and damaging breaches.

Maximizing Online Security: Top DNS Filtering Solutions

Domain Name System (DNS)

With the increasing number of cyber attacks, it has become crucial to prioritize online security. One of the most effective ways to do so is by implementing DNS filtering solutions. These solutions not only block malicious websites but also prevent data theft and malware attacks. In this article, we will be discussing the top DNS filtering solutions that can help maximize online security.

Exploring Top RASP Solutions for Secure Web Applications

Runtime Application Self-Protection (RASP)

As web applications become increasingly complex, the need for robust security measures becomes all the more important. One key solution that is gaining in popularity is RASP, or Runtime Application Self-Protection. Here, we take a closer look at some of the top RASP solutions available today, and how they can help to safeguard your web applications against a range of threats.

CISA Updates Best Practices for MITRE ATT&CK® Mapping

To protect networks and data, CISA believes that understanding the behavior of adversaries is crucial. The success of network defenders in detecting and mitigating cyberattacks depends on this understanding. One tool that helps with this is the MITRE ATT&CK® framework, which is a knowledge base of adversary tactics and techniques based on real-world observations. It’s… Continue reading CISA Updates Best Practices for MITRE ATT&CK® Mapping

ATT&CK v12 is now accessible! Revisions – October 2022

Updates to Techniques, Groups, and Software for Enterprise, Mobile, and ICS are included in the October 2022 (v12) ATT&CK release. The addition of detections to ATT&CK for ICS and the inclusion of Campaigns are the two biggest updates in ATT&CK v12. The ATT&CK for ICS detections are tied to particular Data Sources and Data Components,… Continue reading ATT&CK v12 is now accessible! Revisions – October 2022

Google Announcing GUAC, a great pairing with SLSA (and SBOM)!

The industry is collectively aware of the importance of supply chain security. Recent events include a sharp increase in software supply chain attacks, a catastrophic severity and breadth Log4j vulnerability, and even an Executive Order on Cybersecurity.In light of this, Google is looking for contributors to the GUAC open source project (pronounced like the dip).… Continue reading Google Announcing GUAC, a great pairing with SLSA (and SBOM)!

Canarytokens. org – Rapid, Free, Mass Detection

IntroductionWeb bugs, the transparent images that monitor email opening, are probably already familiar to you. They operate by inserting a special URL in the image tag of a page and keeping an eye on incoming GET requests. Imagine doing that instead for file reads, database searches, process executions, log file patterns, Bitcoin transactions, or even… Continue reading Canarytokens. org – Rapid, Free, Mass Detection

Micro Emulation Plans by MITRE-Engenuity

We enjoy imitating the opposition.  In fact, it’s so important that they’ve written, spoken, trained on it, and are still developing and disseminating more emulation plans (including one of the first public Adversary Emulation Plans).  However, many organisations are unable to overcome the entry barrier due to the expense and complexity involved in developing or even carrying out the majority of adversary emulation plans. The Center for Threat-Informed Defense (Center) collaborated with AttackIQ, Inc., Booz Allen Hamilton, Inc., Citigroup Technology, Inc., Ernst & Young U.S. LLP, Fujitsu, HCA — Information Technology & Services, Inc., IBM Corporation, Microsoft Corporation, and Verizon Business Services to create Micro Emulation Plans in an effort to make adversary emulation accessible to a wider audience. By using simple to use executable binaries that any user can use, these emulation plans re-imagine adversary emulation to focus on very specific threat-informed defensive objectives. Currently Used Adversary EmulationThe four general steps that make up an operation when it comes to adversary emulation today are cyber threat intelligence (CTI) research,… Continue reading Micro Emulation Plans by MITRE-Engenuity

Exit mobile version