Lex CrumptoninMITRE-EngenuityExploring the Frontier: Insights from ATT&CK Evaluations Managed Services Round 2Detection Analysis of Reflective Code Loading used in Managed Services Round 2Aug 20Aug 20
Lex CrumptoninMITRE-EngenuityATT&CK® Evaluations Managed Services (2024): Actionable Insights and the Challenge of Dual…We are thrilled to unveil the results from the ATT&CK Evaluations® Managed Services 2024 (Round 2)Jun 18Jun 18
Lex CrumptoninMITRE-EngenuityInfiltrating Defenses: Abusing VMware in MITRE’s Cyber IntrusionMITRE introduce the notion of a rogue VMs within the Ivanti breachMay 22May 22
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31May 31
Lex CrumptoninMITRE-EngenuityAdvanced Cyber Threats Impact Even the Most PreparedWritten by Lex Crumpton and Charles Clancy.Apr 196Apr 196
Lex CrumptoninMITRE-Engenuity5 Things To Look For in a Cybersecurity ToolWritten by Lex Crumpton.Jun 8, 20231Jun 8, 20231
Lex CrumptoninMITRE-EngenuityDiscovering Malicious Activity: A Blue Teamer’s Quick-Use GuideWritten by Lex Crumpton.Feb 24, 2023Feb 24, 2023