Tag: MITRE
-
Is Your SIEM Working Well Enough? An Introduction to Threat-Informed Security Monitoring
In today’s world, cybersecurity threats are more prevalent than ever before. Companies are facing a growing number of threats, including malware, phishing attacks, ransomware, and more. To combat these threats, many companies are turning to Security Information and Event Management (SIEM) systems to monitor their networks and detect potential threats in real-time. However, simply deploying…
-
Threat modelling for threat detection
Introduction: Security operations centers (SOCs) play a critical role in protecting an organization’s assets and infrastructure. Threat modeling is a critical component of modern security practices and allows SOCs to identify, analyze, and prioritize potential security threats. In this paper, we will focus on the use of the attack tree method and the MITRE Matrix…
-
A quick review on Cyber Threats trends and perspective
Introduction: Cybersecurity has become a critical issue for organizations in all industries as the number and sophistication of cyber threats continue to increase. In order to effectively defend against these threats, organizations must have a clear understanding of the current trends and perspectives in the cyber threat landscape. In this technical white paper, we will…
-
A quick review on Linux lateral movement tactics and techniques
Introduction: Linux lateral movement is a tactic used by attackers to move laterally within a network after they have gained initial access. The goal of lateral movement is to gain access to sensitive information and to escalate their privileges in order to achieve their ultimate objective, such as data exfiltration or complete compromise of the…
-
A quick review on the MITRE ATT&CK matrixA quick review on
Introduction: The MITRE ATT&CK matrix is a comprehensive and well-documented framework that provides organizations with a comprehensive understanding of the tactics, techniques, and procedures used by cyber attackers. The matrix is a valuable resource for organizations to use as a starting point for developing their threat intelligence and for improving their cybersecurity posture. Background: The…