Jon BakerinMITRE-EngenuityIndustry Leaders Expand Threat-Informed Defense to AI-Enabled SystemsWritten by Suneel Sundar.4d ago
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31
Lex CrumptoninMITRE-EngenuityAdvanced Cyber Threats Impact Even the Most PreparedWritten by Lex Crumpton and Charles Clancy.Apr 196Apr 196
Jon BakerinMITRE-EngenuitySoftware Security: Now Threat-Informed!Written by Mark E. Haase.Jun 211Jun 211
Lex CrumptoninMITRE-EngenuityInfiltrating Defenses: Abusing VMware in MITRE’s Cyber IntrusionMITRE introduce the notion of a rogue VMs within the Ivanti breachMay 22May 22
Jon BakerinMITRE-EngenuityIndustry Leaders Expand Threat-Informed Defense to AI-Enabled SystemsWritten by Suneel Sundar.4d ago
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 31
Lex CrumptoninMITRE-EngenuityAdvanced Cyber Threats Impact Even the Most PreparedWritten by Lex Crumpton and Charles Clancy.Apr 196
Lex CrumptoninMITRE-EngenuityInfiltrating Defenses: Abusing VMware in MITRE’s Cyber IntrusionMITRE introduce the notion of a rogue VMs within the Ivanti breachMay 22
Jennifer WennekersPersonal summary: #Stopransomware JCA AA24–131A (Black Basta)tl;dr: Personal write-up of the joint cybersecurity advisory, AA24–131A, covering Black Basta. Black Basta, a ransomware-as-a-service…May 13
Jon BakerinMITRE-EngenuityIntroducing the all-new Adversary Emulation Plan LibraryWritten by Jon Baker and Forrest Carver.Sep 10, 20201
Suneel SundarinMITRE-EngenuityMore Threat-Informed, In More Ways, With More DefendersWritten by Suneel Sundar.May 2