AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

The goal is greater visibility and effectiveness.
The post AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help. appeared first on AttackIQ.
The post AttackIQ and MITRE Engen… Continue reading AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

CrowdStrike + Corelight partner to reach new heights

By Lana Knop, Chief Product Officer, Corelight Through our newly announced partnership with CrowdStrike, Corelight customers will be able to incorporate CrowdStrike’s best-in-class threat intelligence into Corelight Sensors to generate actionable alert… Continue reading CrowdStrike + Corelight partner to reach new heights

Why you’re going about MITRE ATT&CK coverage all wrong

MITRE ATT&CK is the defacto standard for assessing modern behavioral detection against adversary tactics and techniques. Its power resides not just in providing a common language for attacker behaviors, but also as a historical anthology of what th… Continue reading Why you’re going about MITRE ATT&CK coverage all wrong

A Guide to Detecting Microsoft Exchange Zero-Day Exploits

TL;DR First and foremost, apply patches to the Exchange infrastructure. Assume compromise. It’s been reported that the attackers launched a massive compromise attack against 60,000+ Exchange Servers before patches became available, and many other attac… Continue reading A Guide to Detecting Microsoft Exchange Zero-Day Exploits

Infocyte’s Enhanced Detection Rules Engine Maps to MITRE ATT&CK Framework

Security is dynamic because adversaries are always evolving and increasing their sophistication. Companies must defend against known attacks while also being able to stand up defenses to detect and halt emerging threats. Infocyte has provided strong de… Continue reading Infocyte’s Enhanced Detection Rules Engine Maps to MITRE ATT&CK Framework

Network Threat Hunting Made Easy With the MistNet NDR MITRE ATT&CK™ Engine

Security professionals are widely adopting MITRE ATT&CK™ for network threat hunting. ATT&CK stands for Adversarial Tactics, Techniques and Common Knowledge, and it represents a globally accessible information base of adversary tactics and techn… Continue reading Network Threat Hunting Made Easy With the MistNet NDR MITRE ATT&CK™ Engine

In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass

After SolarWinds, organizations need visibility into their security program effectiveness against real world threats. Automated adversary emulations can help meet that need. By generating real data about how your security program performs against menuP… Continue reading In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass

Coming to Life: A Detailed Tutorial on Building Your First ATT&CK Procedure

Note: The attack procedure built in this post will not work for every macOS operating system or in every scenario. There are many factors that can block scripts from running at boot time, and you should always test against your target operating system…. Continue reading Coming to Life: A Detailed Tutorial on Building Your First ATT&CK Procedure

Data Obfuscation: An Image Is Worth a Thousand Lines of Malware

Adversaries love to hide malware in images, a tactic called data obfuscation. To help you solve this problem, at AttackIQ we have built scenarios to test your defensive capabilities’ ability to detect and prevent image-based malware. Read on to learn h… Continue reading Data Obfuscation: An Image Is Worth a Thousand Lines of Malware

Fileless Malware Tops Critical Endpoint Threats for 1H 2020

When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics. Continue reading Fileless Malware Tops Critical Endpoint Threats for 1H 2020