Top 30 most exploited software vulnerabilities being used today

For all the zero-days, custom-crafted malware and other completely unknown security vulnerabilities, others have been around for years and are widely used across the board. To showcase this, the FBI…

Newly Discovered Malware Infects Linux Systems

FontOnLake is a previously unknown malware family that is targeting any systems running Linux. The malware has a limited incidence in the wild and has a sophisticated architecture that allows…

New guidelines for responding to cyber attacks don’t go far enough

Padlokr –  Padlokr –  If Australia’s electricity grid was targeted by cyber attack the fall out could be severe. Shutterstock Adam Henry, UNSW and Greg Austin, UNSW Debates about cyber…

Identifying UNC2452-Related Techniques for ATT&CK

Matt MaloneDec 22, 2020 · 4 min read By Matt Malone (MITRE), Jamie Williams (MITRE), Jen Burns (MITRE), and Adam Pennington (MITRE) Last updated 19 April 2021 12:00pm EDT Reporting…

In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate

Otis AlexanderSep 29, 2020 · 10 min read (Note: The content of this post is being released jointly with Mandiant. It is co-authored with Daniel Kapellmann Zafra, Keith Lunden, Nathan…