Advertisement ยท 728 ร— 90
#
Hashtag
#MITREattack
Advertisement ยท 728 ร— 90
Video

๐ŸŽฎ The Return of Malware & Monsters: Collaborative IR Gaming (2h Workshop) on May 6th!

๐—š๐—ข๐—ง๐—ง๐—” ๐—–๐—ข๐—ก๐—ง๐—”๐—œ๐—ก '๐—˜๐—  ๐—”๐—Ÿ๐—Ÿ: ๐—–๐—ข๐—Ÿ๐—Ÿ๐—”๐—•๐—ข๐—ฅ๐—”๐—ง๐—œ๐—ฉ๐—˜ ๐—œ๐—ก๐—–๐—œ๐——๐—˜๐—ก๐—ง ๐—ฅ๐—˜๐—ฆ๐—ฃ๐—ข๐—ก๐—ฆ๐—˜ ๐—ง๐—ฅ๐—”๐—œ๐—ก๐—œ๐—ก๐—š ๐—ง๐—›๐—ฅ๐—ข๐—จ๐—š๐—› ๐—š๐—”๐— ๐—œ๐—ก๐—š with Klaus Agnoletti (@klausagnoletti) & Glen Sorensen - 6 May, 9AM - 11AM

Back by popular [โ€ฆ]

[Original post on infosec.exchange]

0 0 0 0
Preview
Inside a Volt Typhoon Attack A Complete TryHackMe Write-Up Demonstrating Real SOC Investigation Methodology

Think like a real SOC analyst.

I just published a detailed TryHackMe Volt Typhoon write-up breaking down a full APT investigation โ€” from initial access to C2 and cleanup.

If you're preparing for blue team roles, this room is gold.

#TryHackMe #ThreatHunting #SOCAnalyst #BlueTeam #MITREATTACK

0 0 0 0

Ransomfeed is proud to be cited in a peer-reviewed study on ransomware attack patterns, published on Journal of Information Security and Applications.

Grateful to the authors for acknowledging our dataset. @melillopietro.bsky.social

#CyberSecurityResearch #Ransomware #MITREATTACK

0 0 1 0
Preview
MITRE Caldera: Orchestrating the Complete Attack Lifecycle After exploring the full spectrum of Kali Linux tools across reconnaissance, exploitation, lateral movement, collection, exfiltration, andโ€ฆ

I just published MITRE Caldera: Orchestrating the Complete Attack Lifecycle medium.com/@sdntechdemo...
#Caldera #MITREATTACK #KaliLinux #AdversaryEmulation #CyberSecurity #sdntechforum

0 0 0 0

๐Ÿง  Technical detail: OpenCode auto-started an unauthenticated local HTTP server.

With weak CORS rules, any website could trigger command execution locally โ€” a clear example of AI agents expanding the attack surface.

#AppSec #AIsecurity #DevSecOps #MITREATTACK

0 0 1 0
Post image

Christmas week SOC truth: EDR โ€œleaderโ€ in 2026 = who contains fastest and survives the intern shipping updates to prod. ๐ŸŽ„๐Ÿง‘๐Ÿ’ป๐Ÿ”ฅ

Our model: CrowdStrike 50% (ยฑ8), Defender 35% (ยฑ7), SentinelOne 15% (ยฑ5).
blog.alphahunt.io/crowdstrike-...

#AlphaHunt #XDR #EDR #MITREATTACK

0 0 0 0
Post image

Threat actors are scaling fast. Bitsight's latest briefing breaks down the top TTPs of 2025 and how defenders can disrupt attacks earlier in the kill chain.

๐Ÿ‘‰ Read the full research: https://ow.ly/1Hv250XMOq8

#cybersecurity #ThreatIntelligence #MITREATTACK #BitsightTRACE

0 0 0 0
Preview
Cron Persistence: Why Your Linux Malware Keeps Coming Back (Complete Guide 2025) - OSTechNix Cron persistence is a common Linux malware technique. Learn how it works, how to detect it, and how to remove malicious cron jobs safely.

Learn How Malware Survives Reboots and Cleanup Using Cron Persistence Technique in Linux Systems.

Full Details Here: ostechnix.com/cron-persist...

#CronPersistence #Malware #Cronjob #Cron #LinuxSecurity #MitreAttack #Linux

1 0 0 0

Trying something new and building in public.
It began as a small experiment: could #NLP classify incident narratives?

Repo: github.com/texasbe2tril...

#PotatoSecurity #AI #SOC #MITREATTACK #BuildInPublic #Python #OpenSource #GitHub

7 0 1 0
Post image

MITRE's ATT&CK v18 introduces advanced detection strategies, expands enterprise and mobile coverage, and enhances ICS security. Stay ahead in cybersecurity defense. #MITREATTACK #CyberSecurity #ThreatDetection Link: thedailytechfeed.com/mitre-announ...

1 0 0 0
Preview
CGI elegida para mejorar la ciberseguridad de la Administraciรณn General del Estado con simulaciรณn proactiva - Corresponsables CGI liderarรก un proyecto pionero de simulaciรณn proactiva de ciberataques para la Administraciรณn General del Estado, mejorando su protecciรณn y cumplimiento normativo en lรญnea con la Directiva NIS2

๐Ÿ›ก๏ธ #CGI refuerza la #ciberseguridad de la AGE con simulaciรณn proactiva de ciberataques basada en #MITREATTACK

๐Ÿ‘‰ Un proyecto alineado con la Directiva #NIS2

๐Ÿ”— Mรกs info en #Corresponsables: www.corresponsables.com/actualidad/c...

1 0 0 0

TID maps intelligence to MITRE ATT&CK, converts adversary behaviors into detections, and runs continuous breach-and-attack simulations to validate controls and close gaps. Prioritize adversary emulation and CTEM. #MITREATTACK #CTEM #ThreatIntel https://bit.ly/4mABin8

1 0 0 0
Video

MITRE ATT\&CK Framework Explained ๐Ÿ›ก๏ธ๐Ÿง 
#MITREATTACK #CyberSecurity #ThreatIntelligence #InfoSec #RedTeam #BlueTeam #SecurityFramework #SOC #IncidentResponse #AdversaryTactics

1 0 0 0
Thread

๐ŸŒ Great to see the community putting Thread to work!
Folks are jumping into app.arachne.digital/thread to map news + reports to MITRE ATT&CK.

Tried it yet? Let us know what you mapped ๐Ÿ‘‡

#CyberThreatIntel #MITREATTACK #ThreatInformedDefense #OpenSource

1 1 0 0
Preview
MITRE ATT&CK Framework its elements and its importance in cybersecurity comprehending cyber threats, this blog will cover the MITRE ATT&CK Framework its elements and its importance in cybersecurity posture

This blog will cover the MITRE ATT&CK Framework its elements and its importance in cybersecurity posture

read more: reconbee.com/mitre-attck-...

#MITREATTACK #MITRE #framework #cybersecurityframework #cybersecurity

0 0 0 0
Preview
Signal and Silence: The New Intelligence War Inside Your SOC How AI-native detection engineering is rewriting the rules of cyber defense โ€” and why the old playbook is burning.

Signal and Silence: The New Intelligence War Inside Your SOC
open.substack.com/pub/bradleys...
#Cybersecurity #SOC #AI #ThreatDetection #SIEM #DataLakes #InfoSec #MITREATTACK #CISO #CIO #SecurityOperations #AIinSecurity #DetectionEngineering #SOCBurnout #CyberResilience #IncidentResponse

1 2 0 0
Preview
Why Your Alerts Donโ€™t Remember Yesterdayโ€™s Break-In The Security Guard with Amnesia

Why Your Alerts Donโ€™t Remember Yesterdayโ€™s Break-In
open.substack.com/pub/bradleys...
#Cybersecurity #BehavioralDetection #SecurityOperations #MITREATTACK #ThreatCorrelation #KillChain #SOCStrategy #InfosecLeadership #DigitalDefense #ModernSOC

1 1 0 0
Preview
When Silence Screams: Unmasking the Invisible Intrusion How Security Alerts Are Failing You

When Silence Screams: Unmasking the Invisible Intrusion
open.substack.com/pub/bradleys...
#Cybersecurity #MITREATTACK #BehavioralDetection #ThreatHunting #IdentitySecurity #LateralMovement #SecurityAnalytics #ThreatCorrelation #KillChain #ModernSOC

0 0 0 0