MITRE ATT&CK
Unlock Threat Hunting with MITRE ATT&CK: A 2023 Guide You Can’t Miss
Introduction In today’s rapidly evolving cyber landscape, proactive threat hunting is no longer a luxury—it’s a necessity. Gone are the days when traditional security measures could fully protect your network. Now, you ...
How to Use MITRE ATT&CK in 2023: A Must-Read Guide
Introduction In 2023, cybersecurity remains a pressing concern for businesses big and small. At the heart of this ever-evolving landscape is the MITRE ATT&CK framework. Designed to arm IT professionals with actionable ...
Making the Most of the MITRE ATT&CK Framework: Best Practices for Security Teams
We cover the key benefits of adopting ATT&CK, best practices for utilization, how it can aid threat hunting and investigations, and how it’s integrated into The MixMode Platform ...
What Are MITRE ATT&CK and MITRE D3FEND?
Ever wish you had a crystal ball for cyber threats? Meet MITRE ATT&CK and MITRE D3FEND, your digital fortune-tellers. In a fast-moving threat landscape, staying ahead of your adversaries is crucial. MITRE ...
SaaS Attacks: Compromising an Organization without Touching the Network
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint ...
Implementing MITRE D3FEND for ATT&CK Technique T1110: Brute Force
When account credentials are unknown, attackers may use a brute force attack in order to gain access. This can occur as an early stage of their attack, to gain initial access, or ...
Enterprises Unprepared to Defend Against MITRE ATT&CK Techniques
Enterprises lack detections for more than three-quarters of all MITRE ATT&CK techniques, while 12% of SIEM rules are broken and will never fire due to data quality issues including misconfigured data sources ...
Threat-Informed Defense 101: Understanding the Basics
Over the last decade, the MITRE ATT&CK knowledge base has been widely adopted by thousands of security defenders, ultimately forming a strong community for ATT&CK users. Security teams have leveraged ATT&CK to ...
MITRE ATT&CK Framework Explained: Why it Matters
We all know that cyberthreats have become more frequent, stealthier and more sophisticated. What’s more, the traditional, reactive approach to detecting threats by hunting indicators of compromise (IoCs) using markers like IP ...
LogicHub MDR – Jump Start for AWS Applications
Funny thing about cloud infrastructure - it is well documented that running applications in the cloud can enable better security. Yet, for most companies it’s not the security benefit that drives cloud ...