Leading Vulnerability Scanners: Benefits and Use Cases

Leading vulnerability scanners provide comprehensive security assessment and management capabilities, allowing organizations to identify and remediate potential vulnerabilities in their IT infrastructure. From real-time scanning to automated reporting, these tools offer a range of benefits and use cases, helping businesses to mitigate risks, meet compliance requirements, and enhance overall security posture.

CISA Updates Best Practices for MITRE ATT&CK® Mapping

To protect networks and data, CISA believes that understanding the behavior of adversaries is crucial. The success of network defenders in detecting and mitigating cyberattacks depends on this understanding. One tool that helps with this is the MITRE ATT&CK® framework, which is a knowledge base of adversary tactics and techniques based on real-world observations. It’s… Continue reading CISA Updates Best Practices for MITRE ATT&CK® Mapping

Micro Emulation Plans by MITRE-Engenuity

We enjoy imitating the opposition.  In fact, it’s so important that they’ve written, spoken, trained on it, and are still developing and disseminating more emulation plans (including one of the first public Adversary Emulation Plans).  However, many organisations are unable to overcome the entry barrier due to the expense and complexity involved in developing or even carrying out the majority of adversary emulation plans. The Center for Threat-Informed Defense (Center) collaborated with AttackIQ, Inc., Booz Allen Hamilton, Inc., Citigroup Technology, Inc., Ernst & Young U.S. LLP, Fujitsu, HCA — Information Technology & Services, Inc., IBM Corporation, Microsoft Corporation, and Verizon Business Services to create Micro Emulation Plans in an effort to make adversary emulation accessible to a wider audience. By using simple to use executable binaries that any user can use, these emulation plans re-imagine adversary emulation to focus on very specific threat-informed defensive objectives. Currently Used Adversary EmulationThe four general steps that make up an operation when it comes to adversary emulation today are cyber threat intelligence (CTI) research,… Continue reading Micro Emulation Plans by MITRE-Engenuity

Serverless Top security best practices

Describe serverless.A cloud execution model is serverless computing. It enables users and developers to create and use applications and services without having to worry about servers. Applications are created more quickly, launched only when necessary, and infrastructure management is no longer necessary. Servers do still exist in serverless, but they are removed from the process… Continue reading Serverless Top security best practices

MITRE ATT&CK® Released Updates in Apr 2022 With Additional Techniques and Structuring

The Techniques, Groups, and Software for Enterprise, Mobile, and ICS are updated in the April 2022 (v11) ATT&CK release. The most significant modifications are the reorganisation of Detections, which are now connected to Data Source and Data Component objects in Enterprise ATT&CK, the beta release of ATT&CK for Mobile using sub-techniques, and the addition of… Continue reading MITRE ATT&CK® Released Updates in Apr 2022 With Additional Techniques and Structuring

Campaigns to be Introduced to MITRE ATT&CK V12

Primary Articles Published by Matt Malona In ATT&CK 2022 roadmap, at ATT&CKCon 3.0, and most recently on the SANS Threat Analysis Rundown, we’ve discussed incorporating campaigns into ATT&CK, but their release is soon approaching! Beginning with the release of ATT&CK v12 on October 25, you will be able to use the Campaigns structure for all… Continue reading Campaigns to be Introduced to MITRE ATT&CK V12

Beta Mobile Sub-Techniques, Structured Detections, and ICS Join the Band as ATT&CK Upgrades to Version 11

The most recent ATT&CK release is now available, and this time They have upgraded to version 11! There shouldn’t be any major surprises if you’ve been following their roadmap, but they wanted to take this opportunity to go over their most recent updates. A beta version of the sub-techniques for ATT&CK for Mobile and ATT&CK… Continue reading Beta Mobile Sub-Techniques, Structured Detections, and ICS Join the Band as ATT&CK Upgrades to Version 11

Dufflebag

A tool called Dufflebag developed by dan-bishopfox Dan Petro and bmoar Ben Morris looks through open Elastic Block Storage (EBS) snapshots for information that might have been unintentionally left inside. The amount of passwords and secrets that are just lying around might surprise you! Due to the fact that reading EBS volumes in practice isn’t particularly simple,… Continue reading Dufflebag

MITRE ATT&CK® Released Updates in Oct 2021 With Additional Techniques and Structuring

MITRE ATT&CK® is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the creation of ATT&CK, MITRE… Continue reading MITRE ATT&CK® Released Updates in Oct 2021 With Additional Techniques and Structuring

Gartner EDRs are not perfect, fail against common attacks

Advanced Persistent threats have been a pain for blue teams for a very long time, and one of the key tool in the arsenal is Endpoint Detection and Response tools since the recent past, however, they come with their limitations as well. endpoint detection & response (EDR) software from 18 of today’s top cybersecurity firms… Continue reading Gartner EDRs are not perfect, fail against common attacks

Exit mobile version