MITRE CalderaEmulating complete, realistic cyber attack chains with the new Caldera Bounty Hunter pluginAuthors: Louis Hackländer-Jansen3d ago
Thomas RocciainSecurityBreak6 Useful Infographics for Threat IntelligenceVisualizing Cybersecurity concepts can be a terrific way to learn more about specific tools, methodologies, and techniques! Here is a post…Dec 18, 202210
Vignesh NarayanasamyProactive Threat Hunting: Leveraging Techniques and Pseudocode for Effective DetectionWhat is Threat Hunting?6d ago6d ago
Mike CunninghaminMITRE-EngenuityThreat-Informed Defense to Secure AIWritten by Tabitha Colter, Shiri Bendelac, Lily Wong, Christina Liaghati, & Keith ManvilleSep 30Sep 30
MITRE CalderaEmulating complete, realistic cyber attack chains with the new Caldera Bounty Hunter pluginAuthors: Louis Hackländer-Jansen3d ago
Thomas RocciainSecurityBreak6 Useful Infographics for Threat IntelligenceVisualizing Cybersecurity concepts can be a terrific way to learn more about specific tools, methodologies, and techniques! Here is a post…Dec 18, 202210
Vignesh NarayanasamyProactive Threat Hunting: Leveraging Techniques and Pseudocode for Effective DetectionWhat is Threat Hunting?6d ago
Mike CunninghaminMITRE-EngenuityThreat-Informed Defense to Secure AIWritten by Tabitha Colter, Shiri Bendelac, Lily Wong, Christina Liaghati, & Keith ManvilleSep 30
Eduardo EscanillaSchrödinger’s Cat Exfiltrating Data Without Being SeenIn 2023, I was preparing a Red Team exercise with the objective of exfiltrating data from an institution. The challenge was to carry out…6d ago
ValerieTafurMITRE [TryHackMe]This room will discuss the various resources MITRE has made available for the cybersecurity community.Jun 13, 20231
Emanuele (Ebalo) BalsamoinPurple TeamAdvanced Threat Hunting Techniques: Part 2Leveraging Threat Intelligence PlatformsSep 25