Remove threat-intelligence think-like-an-attacker-how-a-red-team-operates
article thumbnail

How to Use MITRE ATT&CK to Understand Attacker Behavior

eSecurity Planet

MITRE ATT&CK (“miter attack”) is an up-to-date and widely-used knowledge base that focuses on how attackers think and operate. It’s based on practical use cases, so companies can better evaluate security issues and get examples of common tactics and techniques used by threat actors.

Analytics 113
article thumbnail

McAfee Finds Years-Long Attack by Chinese-Linked APT Groups

eSecurity Planet

An investigation by McAfee researchers into a case of a suspected malware infection uncovered a cyber attack that had been sitting in the victim organization’s network for years stealing data. Chinese-Linked APT Groups Likely Suspects. Beek wrote. “We We strongly believe that is exactly what we observe here as well.

Military 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Outlook 2023: Cyber Warfare Expands Threats

eSecurity Planet

After a year that saw massive ransomware attacks and open cyber warfare, the biggest question in cybersecurity for 2023 will likely be how much of those attack techniques get commoditized and weaponized. Wiper Malware, Critical Infrastructure Threats Unleashed by War. RaaS and CaaS Continue to Grow.

Security 145
article thumbnail

Expert Insight: Cliff Martin

IT Governance

He joined the Group in April 2021, bringing experience from the defence industry, where he dealt with both operational technology and IT complexities. We sat down to talk to him about the second core requirement of DORA [Digital Operational Resilience Act]: incident management. What is your view on DORA as a whole?

Risk 52
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Or even basic low level threat analysis. Chris Gray of Deep Watch talks about the view from the inside of a virtual SOC, the ability to see threats against a large number of SMB organizations, and the changes to cyber insurance we’re seeing as a result. A lot of SMBs do not have security operations centers or SOCs.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

And the fact that hackers are thinking about this now is a very good thing. “We wanted to show that this attack is has serious consequences for this vehicle.” “We wanted to show that this attack is has serious consequences for this vehicle.” Can you hack an airplane? A satellite in orbit?

article thumbnail

When And How Cos. Should Address Cyber Legal Compliance

Data Matters

Regardless whether their companies possess potentially vulnerable consumer data, valuable trade secrets, intellectual property, or confidential business information; own or operate critical infrastructure; or rely on essential computer networks or information systems, boards have recognized the criticality of cyberrisks to their businesses.