Search Results for: mitre Blog Post MITRE ATT&CK v9 is out and includes ATT&CK for Containers June 2, 2021 For those not familiar, ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques maintained by MITRE based on... Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from... Blog Post ATT&CK knowledge base by MITRE February 20, 2020 ATT&CK for ICS is a comprehensive threat detection framework that provides security managers to assess and improve their security controls... Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there... Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Knowledge Center Guide to Hardening Windows 10 November 3, 2020 Introduction Windows 10 is the most widely used desktop operating system in enterprise environment. It features extensive security policies, allowing... Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to... Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... Blog Post How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape... Blog Post Cross Section of the Conti Ransomware Attack and its TTPs May 10, 2021 The first mention of Conti ransomware is from May 2020. It is characterized by its rapid spread to systems and... Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and... Blog Post CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission... Blog Post CISA Warns On Possible Cyber Attacks Due To Heightened U.S. – China Tensions October 20, 2020 Political affiliations aside, Trump’s hardened stance on China as well as continued trade conflicts has exacerbated longstanding mistrust. Chinese cyber-attacks... Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...
Blog Post MITRE ATT&CK v9 is out and includes ATT&CK for Containers June 2, 2021 For those not familiar, ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques maintained by MITRE based on...
Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from...
Blog Post ATT&CK knowledge base by MITRE February 20, 2020 ATT&CK for ICS is a comprehensive threat detection framework that provides security managers to assess and improve their security controls...
Blog Post Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is...
Knowledge Center Guide to Hardening Windows 10 November 3, 2020 Introduction Windows 10 is the most widely used desktop operating system in enterprise environment. It features extensive security policies, allowing...
Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to...
Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
Blog Post How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape...
Blog Post Cross Section of the Conti Ransomware Attack and its TTPs May 10, 2021 The first mention of Conti ransomware is from May 2020. It is characterized by its rapid spread to systems and...
Blog Post Detecting Malware Capabilities With capa July 29, 2020 What is capa? capa is a new tool recently developed by FireEye. This tool makes some reverse engineering tasks tremendously easy and...
Blog Post CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission...
Blog Post CISA Warns On Possible Cyber Attacks Due To Heightened U.S. – China Tensions October 20, 2020 Political affiliations aside, Trump’s hardened stance on China as well as continued trade conflicts has exacerbated longstanding mistrust. Chinese cyber-attacks...
Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...