Leverage MITRE ATT&CK to Gain Iranian Cyberattack Insights
Continued tension between the US and Iran—along with attacks originating from Iranian groups—suggest that such cyberattacks from Iran-affiliated[…]
The data breach at Capital One that exploited a vulnerability in the cloud reported a few weeks ago was one of the largest-ever bank data thefts. We look at how it maps to the MITRE ATT&CK framework and how it could have been detected.
Modern SIEMs use threat hunting techniques so security analysts can more easily and effectively pinpoint specific threats and expose all related activities that bad actors may be using to attack your infrastructure. Read more about the advantages of TTP-based threat hunting.
Read about the new genus of malware that breaks the rules of traditional detection and defense methods. Called fileless malware, it’s unlike other breeds of malware that require the installation of software on a victim’s machine. According to the Ponemon Institute, it accounts for 35% of all cyberattacks in 2018.