The Evolution of Connected Cars as Defined by Threat Modeling UN R155-Listed Attack Vectors

Trend Micro – Trend Micro – The United Nations Regulation No. 155 sets provisions for cybersecurity and cyber security management systems in vehicles. A notable section of the document is…

SUNBURST backdoor malware: What it is, how it works, and how to prevent it | Malware spotlight

SUNBURST is a supply chain attack that takes advantage of a backdoor implanted in a supplier to target and compromise organizations indirectly around the globe. Orion, the SolarWinds software that…

Ransomware Gangs Using Data Leak Sites to Recruit New Affiliates

Security Intelligence – Security Intelligence – Ransomware Gangs Using Data Leak Sites to Recruit New Affiliates Ransomware gangs have a new technique to recruit affiliates: posting announcements on their own…

API Releases New Standard for Pipeline Control Systems

Trend Micro – Trend Micro – On August 18, 2021, the American Petroleum Institute (API) released the third edition of Standard 1164, Pipeline Control Systems Cybersecurity. The edition has been…

Using Python for MITRE ATT&CK and data encrypted for impact

Infosec Institute –  Infosec Institute –  The MITRE ATT&CK framework is a tool designed to aid understanding of how cyberattacks work. MITRE ATT&CK breaks the lifecycle of a cyberattack into…

Explore Python for MITRE ATT&CK exfiltration and non-application layer protocol

Infosec Institute –  Infosec Institute –  The MITRE ATT&CK framework is a tool developed by the MITRE Corporation to build an understanding of how cyberattacks work. It breaks the lifecycle…

Explore Python for MITRE ATT&CK command-and-control

Infosec Institute –  Infosec Institute –  The MITRE ATT&CK framework defines a set of tactics or objectives that a cyberattacker may need to achieve in the course of their attack…

Explore Python for MITRE ATT&CK email collection and clipboard data

Infosec Institute –  Infosec Institute –  The MITRE ATT&CK framework breaks the lifecycle of a cyberattack in a set of objectives (or tactics) that the attacker may need to accomplish…

Explore Python for MITRE ATT&CK lateral movement and remote services

Infosec Institute –  Infosec Institute –  The MITRE ATT&CK framework breaks the cyberattack lifecycle into a set of objectives that an attacker may need to achieve during their attack. For…

Explore Python for MITRE ATT&CK account and directory discovery

Infosec Institute –  Infosec Institute –  The MITRE ATT&CK framework breaks the lifecycle of a cyberattack into a series of tactics or goals that the attacker may need to achieve.…