๐ฎ The Return of Malware & Monsters: Collaborative IR Gaming (2h Workshop) on May 6th!
๐๐ข๐ง๐ง๐ ๐๐ข๐ก๐ง๐๐๐ก '๐๐ ๐๐๐: ๐๐ข๐๐๐๐๐ข๐ฅ๐๐ง๐๐ฉ๐ ๐๐ก๐๐๐๐๐ก๐ง ๐ฅ๐๐ฆ๐ฃ๐ข๐ก๐ฆ๐ ๐ง๐ฅ๐๐๐ก๐๐ก๐ ๐ง๐๐ฅ๐ข๐จ๐๐ ๐๐๐ ๐๐ก๐ with Klaus Agnoletti (@klausagnoletti) & Glen Sorensen - 6 May, 9AM - 11AM
Back by popular [โฆ]
[Original post on infosec.exchange]
Think like a real SOC analyst.
I just published a detailed TryHackMe Volt Typhoon write-up breaking down a full APT investigation โ from initial access to C2 and cleanup.
If you're preparing for blue team roles, this room is gold.
#TryHackMe #ThreatHunting #SOCAnalyst #BlueTeam #MITREATTACK
Ransomfeed is proud to be cited in a peer-reviewed study on ransomware attack patterns, published on Journal of Information Security and Applications.
Grateful to the authors for acknowledging our dataset. @melillopietro.bsky.social
#CyberSecurityResearch #Ransomware #MITREATTACK
I just published MITRE Caldera: Orchestrating the Complete Attack Lifecycle medium.com/@sdntechdemo...
#Caldera #MITREATTACK #KaliLinux #AdversaryEmulation #CyberSecurity #sdntechforum
๐ง Technical detail: OpenCode auto-started an unauthenticated local HTTP server.
With weak CORS rules, any website could trigger command execution locally โ a clear example of AI agents expanding the attack surface.
#AppSec #AIsecurity #DevSecOps #MITREATTACK
Christmas week SOC truth: EDR โleaderโ in 2026 = who contains fastest and survives the intern shipping updates to prod. ๐๐ง๐ป๐ฅ
Our model: CrowdStrike 50% (ยฑ8), Defender 35% (ยฑ7), SentinelOne 15% (ยฑ5).
blog.alphahunt.io/crowdstrike-...
#AlphaHunt #XDR #EDR #MITREATTACK
Threat actors are scaling fast. Bitsight's latest briefing breaks down the top TTPs of 2025 and how defenders can disrupt attacks earlier in the kill chain.
๐ Read the full research: https://ow.ly/1Hv250XMOq8
#cybersecurity #ThreatIntelligence #MITREATTACK #BitsightTRACE
Learn How Malware Survives Reboots and Cleanup Using Cron Persistence Technique in Linux Systems.
Full Details Here: ostechnix.com/cron-persist...
#CronPersistence #Malware #Cronjob #Cron #LinuxSecurity #MitreAttack #Linux
Trying something new and building in public.
It began as a small experiment: could #NLP classify incident narratives?
Repo: github.com/texasbe2tril...
#PotatoSecurity #AI #SOC #MITREATTACK #BuildInPublic #Python #OpenSource #GitHub
MITRE's ATT&CK v18 introduces advanced detection strategies, expands enterprise and mobile coverage, and enhances ICS security. Stay ahead in cybersecurity defense. #MITREATTACK #CyberSecurity #ThreatDetection Link: thedailytechfeed.com/mitre-announ...
๐ก๏ธ #CGI refuerza la #ciberseguridad de la AGE con simulaciรณn proactiva de ciberataques basada en #MITREATTACK
๐ Un proyecto alineado con la Directiva #NIS2
๐ Mรกs info en #Corresponsables: www.corresponsables.com/actualidad/c...
TID maps intelligence to MITRE ATT&CK, converts adversary behaviors into detections, and runs continuous breach-and-attack simulations to validate controls and close gaps. Prioritize adversary emulation and CTEM. #MITREATTACK #CTEM #ThreatIntel https://bit.ly/4mABin8
MITRE ATT\&CK Framework Explained ๐ก๏ธ๐ง
#MITREATTACK #CyberSecurity #ThreatIntelligence #InfoSec #RedTeam #BlueTeam #SecurityFramework #SOC #IncidentResponse #AdversaryTactics
๐ Great to see the community putting Thread to work!
Folks are jumping into app.arachne.digital/thread to map news + reports to MITRE ATT&CK.
Tried it yet? Let us know what you mapped ๐
#CyberThreatIntel #MITREATTACK #ThreatInformedDefense #OpenSource
This blog will cover the MITRE ATT&CK Framework its elements and its importance in cybersecurity posture
read more: reconbee.com/mitre-attck-...
#MITREATTACK #MITRE #framework #cybersecurityframework #cybersecurity
Signal and Silence: The New Intelligence War Inside Your SOC
open.substack.com/pub/bradleys...
#Cybersecurity #SOC #AI #ThreatDetection #SIEM #DataLakes #InfoSec #MITREATTACK #CISO #CIO #SecurityOperations #AIinSecurity #DetectionEngineering #SOCBurnout #CyberResilience #IncidentResponse
Why Your Alerts Donโt Remember Yesterdayโs Break-In
open.substack.com/pub/bradleys...
#Cybersecurity #BehavioralDetection #SecurityOperations #MITREATTACK #ThreatCorrelation #KillChain #SOCStrategy #InfosecLeadership #DigitalDefense #ModernSOC
When Silence Screams: Unmasking the Invisible Intrusion
open.substack.com/pub/bradleys...
#Cybersecurity #MITREATTACK #BehavioralDetection #ThreatHunting #IdentitySecurity #LateralMovement #SecurityAnalytics #ThreatCorrelation #KillChain #ModernSOC