PacketNut; Confessions of an Enterprise Information Security Architect

A blog for Security Architects, CISOs and anyone else responsible for protecting their organisation's information assets

Useful Info

  • Home
  • Companies that interest me

Tuesday, 13 August 2019

MITRE ATT&CK

High level overview of the MITRE ATT&CK model by Exabeam.
https://www.exabeam.com/information-security/what-is-mitre-attck-an-explainer/

Posted by Tony Brown at 23:35 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Security News

  • Schneier on Security
    Friday Squid Blogging: Squid Chromolithographs
    56 minutes ago
  • Security Boulevard
    Fuzz Testing and Medical Devices
    1 hour ago
  • Latest topics for ZDNet in Security
    How to enable Bitwarden biometric unlock (and why you should)
    1 hour ago
  • CSO Online
    Russia points finger at US for iPhone exploit campaign that also hit Kaspersky Lab
    1 hour ago
  • Dark Reading:
    PyPI's 2FA Requirements Don't Go Far Enough, Researchers Say
    1 hour ago
  • Troy Hunt
    Weekly Update 350
    2 hours ago
  • The Register - Security
    Malaysia goes its own Huawei, won't ban Chinese vendor from 5G network
    3 hours ago
  • News – SC Media
    Millions of users vulnerable to zero-day in MOVEit file transfer app
    3 hours ago
  • Latest news and stories from BleepingComputer.com
    Windows 11 to require SMB signing to prevent NTLM relay attacks
    3 hours ago
  • IBTimes.co.uk : Technology
    Russia's war on teenagers and children in Ukraine
    3 hours ago
  • Techdirt.
    AI Will Never Fit Into A Licensing Regime
    4 hours ago
  • Cybersecurity Insiders
    Two Years Since the Colonial Pipeline Hack, Here’s What We’ve Learned
    5 hours ago
  • Latest Security Articles from ComputerworldUK
    WWDC: Morgan Stanley says December launch for Apple Reality
    6 hours ago
  • Cisco Blog
    Carhartt drives exponential growth with new revenue streams – backed by Cisco application solutions
    6 hours ago
  • SecurityWeek RSS Feed
    Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
    8 hours ago
  • Security Intelligence
    Detecting Insider Threats: Leverage User Behavior Analytics
    9 hours ago
  • Cybersecurity
    SentinelOne CEO Tomer Weingarten on Q1 earnings: We need to perform better
    9 hours ago
  • The Hacker News
    New Botnet Malware 'Horabot' Targets Spanish-Speaking Users in Latin America
    10 hours ago
  • ComputerWeekly: IT security
    Discovering the Diversity Process Flow in cyber
    16 hours ago
  • Risky Business
    Risky Biz News: Yo Vladimir! All your iPhones are belong to us!
    22 hours ago
  • Light Reading:
    Nokia Bell Labs' Peter Vetter: 6G, the network with the sixth sense
    1 day ago
  • Motherboard US - Hacking US
    Russian FSB Accuses U.S. of Hacking Thousands of iPhones in Russia
    1 day ago
  • Graham Cluley
    Decade-old critical vulnerability in Jetpack patched on millions of WordPress websites
    1 day ago
  • SearchSecurity: Security Wire Daily News
    Zyxel vulnerability under 'widespread exploitation'
    1 day ago
  • Krebs on Security
    Ask Fitis, the Bear: Real Crooks Sign Their Malware
    1 day ago
  • Google Online Security Blog
    Announcing the Chrome Browser Full Chain Exploit Bonus
    1 day ago
  • IT SECURITY GURU
    Research Reveals UK Firms Plan to Embrace New Era of Digital Identity
    2 days ago
  • Daniel Miessler
    No. 384 World AI Coin, Russian Power Attacks, Guidance AI Workflow…
    3 days ago
  • EFF Press Releases
    Civil Liberties Groups Demand California Police Stop Sharing Drivers’ Location Data With Police In Anti-Abortion States
    1 week ago
  • Cybercrime | The Guardian
    GCHQ warns of fresh threat from Chinese state-sponsored hackers
    1 week ago
  • Cybercrime Magazine
    2023 Cybersecurity Almanac: 100 Facts, Figures, Predictions, And Statistics
    1 week ago
  • NCSC Site
    Zero trust: building a mixed estate
    3 months ago
  • Errata Security
    C can be memory-safe
    4 months ago
  • Hacker Combat - Cyber Security and Hacking News | HackerCombat
    How to delete an account from Instagram?
    5 months ago
  • Softpedia News / Security
    Google Expands End-to-End Encryption for Gmail on the Web
    5 months ago
  • Threatpost | The first stop for security news
    Student Loan Breach Exposes 2.5M Records
    9 months ago
  • DDoS Attacks
    Link11 Discovers Record Number of DDoS Attacks in First Half of 2021
    1 year ago
  • Feedspot Blog
    Top 5 Ayurveda Forums, Discussions, Message Boards To Follow in 2021
    1 year ago
  • Computer Business Review
    Network transformation: The foundation for digital business
    2 years ago
  • RSA Conference Blog
    A WORD OF CAUTION: AVOID SCAMMERS CLAIMING TO HAVE THE RSAC ATTENDEE LIST
    2 years ago
  • Bad Packets Report
    Over 3,000 F5 BIG-IP endpoints vulnerable to CVE-2020-5902
    2 years ago
  • Cybersecurity Zen
    SecureNinja ▶︎ Live Instructor-Led Online Training
    3 years ago
  • Ars Technica » Risk Assessment
    What the newly released Checkra1n jailbreak means for iDevice security
    3 years ago
  • US-CERT Tips
    Privacy and Mobile Device Apps
    3 years ago
  • Infosecurity Europe Blog
    Infosecurity Magazine takes over Infosecurity North America 2018
    4 years ago
  • CRN
    WATCH: Digital Guardian Exec On How Its Move To The Cloud Benefits Partners
    4 years ago
  • SecurityRoundTable.org
    Why A ‘Cloud Architect’ Should Be on Your Hiring Agenda
    5 years ago
  • WIRED » Threat Level
    Feds Charge NSA Contractor Accused of Exposing Russian Hacking
    5 years ago
  • Security | The Silicon Review
    Is it true that internet has penetrated only to handful of the Indian population?!
    6 years ago
  • Latest articles from SC Magazine UK
    400% increase in POS malware variants across US Thanksgiving weekend
    6 years ago
  • Blog - devsecops
    DevSecOps is the Krav Maga of Security
    6 years ago
  • Forbes - Security
    FTC: Explosion Of Tax Identity Theft Swamps Growth In Other Consumer Complaints
    10 years ago
  • AlienVault Blogs
Show 10 Show All

Vendors

  • AWS Security Blog
    New eBook: 5 Keys to Secure Enterprise Messaging
    5 hours ago
  • Rapid7 Blog
    Metasploit Weekly Wrap-Up
    5 hours ago
  • Heimdal Security Blog
    New QBot Malware Campaign Exploits WordPad for Infection
    6 hours ago
  • Naked Security
    Researchers claim Windows “backdoor” affects hundreds of Gigabyte motherboards
    8 hours ago
  • SentinelOne
    The Good, the Bad and the Ugly in Cybersecurity – Week 22
    9 hours ago
  • CloudFlare
    Dynamic data collection with Zaraz Worker Variables
    9 hours ago
  • Palo Alto Networks Blog
    Extending Zero Trust OT Security to Meet Air Gap Requirements
    9 hours ago
  • Tenable Blog
    Cybersecurity Snapshot: Will AI Kill Us All? How Can You Boost Identity Security? Do You Use a Framework for Cloud Security?
    9 hours ago
  • We Live Security » Languages » English
    All eyes on APIs: Top 3 API security risks and how to mitigate them
    1 day ago
  • CyberArk
    Cyber Breach Remediation’s 5-Step Cycle
    1 day ago
  • Malwarebytes Unpacked
    US hospital forced to divert ambulances after cyberattack
    1 day ago
  • Recorded Future
    Private Eyes: China’s Embrace of Open-Source Military Intelligence
    1 day ago
  • Anomali Blog
    Anomali Cyber Watch: Shadow Force Targets Korean Servers, Volt Typhoon Abuses Built-in Tools, CosmicEnergy Tests Electric Distribution Disruption
    2 days ago
  • Darktrace Blog
    Darktrace Integrates Self-Learning AI with Amazon Security Lake to Support Security Investigations
    2 days ago
  • Darktrace Blog
    Darktrace Integrates Self-Learning AI with Amazon Security Lake to Support Security Investigations
    2 days ago
  • The Akamai Blog
    Deliver Fast, Reliable, and Secure Web Experiences with HTTP/3
    2 days ago
  • Varonis Blog
    Ghost Sites: Stealing Data From Deactivated Salesforce Communities
    2 days ago
  • Packet Pushers - Briefings In Brief
    Tech Bytes: Assembling A SASE Architecture With Fortinet (Sponsored)
    3 days ago
  • Imperva Cyber Security Blog
    Why Attackers Target the Gaming Industry
    3 days ago
  • Postmodern Security
    Dancing with the Cloud
    1 week ago
  • ClearSky Cybersecurity
    Fata Morgana: Watering hole attack on shipping and logistics websites
    1 week ago
  • ThreatConnect | Enterprise Threat Intelligence Platform
    The 7 Tenets of Threat Intelligence Operations – Tenet #2: Requires an Evolved Threat Intelligence Lifecycle
    2 weeks ago
  • Centrify Cloud Service Status - Incident History
    Delinea 23.1 Cloud Maintenance
    2 weeks ago
  • Check Point Blog
    April 2023’s Most Wanted Malware: Qbot Launches Substantial Malspam Campaign and Mirai Makes its Return
    3 weeks ago
  • Arbor Networks Threat Intelligence
    100% Increase in DDoS Attacks Against India
    5 weeks ago
  • Securosis Highlights
    The THIRTEENTH Annual Disaster Recovery Breakfast: Changing of the Guard
    2 months ago
  • Cisco Blog » Security
    Smart and Frictionless Zero Trust Access for the Workforce
    3 months ago
  • Errata Security
    C can be memory-safe
    4 months ago
  • TaoSecurity
    Happy 20th Birthday TaoSecurity Blog
    4 months ago
  • Fooling the Interpreter
    Tag Blending Obfuscation In Property-Based Payloads
    10 months ago
  • blog.trendmicro.co.uk
    Delivering visibility, control and simplified security to Bathgate Group 
    1 year ago
  • TrendLabs Security Intelligence Blog
    Finest Free Torrenting VPNs
    1 year ago
  • AlienVault Blogs
    This feed has moved and will be deleted soon. Please update your subscription now.
    1 year ago
  • Carbon Black
    VMware Carbon Black Delivers High-Fidelity Insight at Every Step of MITRE Engenuity ATT&CK® Evaluation
    2 years ago
  • CipherCloud
    CipherCloud and Lookout Blaze a New Path Together – Redefining Security from Endpoint to Cloud
    2 years ago
  • Inside The Threat Blog by Lancope
    This feed has moved and will be deleted soon. Please update your subscription now.
    2 years ago
  • Skybox Security Blog – Cybersecurity from The Skybox View
    Salt Vulnerabilities Exploited with Targeted Cryptomining Attack on DigiCert
    3 years ago
  • Zscaler Research
    Frenchy – Shellcode in the Wild
    3 years ago
  • Cisco Blog » Threat Research
    How Adversaries Use Politics for Compromise
    3 years ago
  • Preempt Blog
    Why Insider Threat Denial is Everyone’s Problem
    3 years ago
  • Network Security Blog
    Lucky Break
    4 years ago
  • Threat Research
    BIOS Boots What? Finding Evil in Boot Code at Scale!
    4 years ago
  • Threat Intelligence
    Lojack Becomes a Double-Agent
    5 years ago
  • Fortinet Blog
    Securing the Network: What Three Key Verticals Require
    5 years ago
  • Cyphort
    Equifax Breach: The News We All Dreaded to Hear.
    5 years ago
  • Speaking of Security - The RSA Blog and Podcast
    A Security Decision – Build or Buy
    5 years ago
  • Metasploit
    Metasploit Wrapup
    5 years ago
  • Threat Geek
    Reducing Detection from Months to Minutes: Detecting Credentials in the Clear
    6 years ago
  • Lockheed Martin Cybersecurity Blog
    How Threat Intelligence Can Increase an Organization’s Cybersecurity Maturity
    6 years ago
  • iSIGHT Partners
    ThreatScape Media Highlights Update – Week Of June 8th
    6 years ago
  • Liquidmatrix Security Digest
    Hello world!
    7 years ago
  • LogRhythm: The Dialog - The Security Intelligence Company
    Getting Started with Threat Intelligence
    7 years ago
  • IBM Internet Security Systems Internet Threat Information
    Multiple Adobe Flash Player code execution vulnerabilities
    8 years ago
  • Our Blog | Core Security
  • Comments on: The Top 10 AlgoSec Blog Posts From 2018
  • Farsight Security Blog
  • Trustwave Newsroom
  • Cylance Blog
Show 10 Show All

Blog Archive

  • ►  2020 (2)
    • ►  May (2)
  • ▼  2019 (35)
    • ►  December (2)
    • ►  November (2)
    • ►  October (6)
    • ►  September (5)
    • ▼  August (1)
      • MITRE ATT&CK
    • ►  June (1)
    • ►  February (4)
    • ►  January (14)
  • ►  2018 (4)
    • ►  December (2)
    • ►  September (1)
    • ►  April (1)
  • ►  2017 (6)
    • ►  August (5)
    • ►  July (1)
  • ►  2016 (1)
    • ►  January (1)
  • ►  2015 (4)
    • ►  September (4)
  • ►  2013 (3)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)

About Me

Tony Brown
Enterprise Security Solutions Architect at global service provider. CCIE #8767. CISSP. Chartered Engineer. MSc. in Information Security. CCDE 2011:6 Chartered IT Professional. Member of the Institute of Information Security Professionals. Blah blah blah
View my complete profile
Awesome Inc. theme. Powered by Blogger.