Published inMITRE ATT&CK®What Comes After Detection Rules? Smarter Detection Strategies in ATT&CKATT&CK’s new model links strategies, analytics, and log sources into reusable blueprints tailored to real-world telemetry.4d ago4d ago
Published inCenter for Threat-Informed DefenseExploring the Frontier: Insights from ATT&CK Evaluations Managed Services Round 2Detection Analysis of Reflective Code Loading used in Managed Services Round 2Aug 20, 2024Aug 20, 2024
Published inCenter for Threat-Informed DefenseATT&CK® Evaluations Managed Services (2024): Actionable Insights and the Challenge of Dual…We are thrilled to unveil the results from the ATT&CK Evaluations® Managed Services 2024 (Round 2)Jun 18, 2024Jun 18, 2024
Published inCenter for Threat-Informed DefenseInfiltrating Defenses: Abusing VMware in MITRE’s Cyber IntrusionMITRE introduce the notion of a rogue VMs within the Ivanti breachMay 22, 2024May 22, 2024
Published inCenter for Threat-Informed DefenseTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 3, 2024A response icon1May 3, 2024A response icon1
Published inCenter for Threat-Informed DefenseAdvanced Cyber Threats Impact Even the Most PreparedWritten by Lex Crumpton and Charles Clancy.Apr 19, 2024A response icon6Apr 19, 2024A response icon6
Published inCenter for Threat-Informed Defense5 Things To Look For in a Cybersecurity ToolWritten by Lex Crumpton.Jun 8, 2023A response icon1Jun 8, 2023A response icon1
Published inCenter for Threat-Informed DefenseDiscovering Malicious Activity: A Blue Teamer’s Quick-Use GuideWritten by Lex Crumpton.Feb 24, 2023Feb 24, 2023