TTPs
Understanding the Progression of a Ransomware Attack
Everyone should be familiar with ransomware and its impact on businesses by now. But while you may understand the very basics of ransomware, you can’t really protect your organization until you are ...
Security Boulevard
Splunk: Cybercriminals Use These Types of TTPs
A report published by Splunk that analyzed three years of data showed a marked increase in the number of cyberattacks that employ four specific types of techniques. Based on analysis of data ...
Security Boulevard
Cymulate Identifies Cyberattack Technique That Evades EDR Platforms
Cymulate, a cybersecurity posture assessment platform provider, shared a technique, dubbed Blindside, that enables malware to evade some endpoint detection and response (EDR) platforms and other monitoring/control systems. Mike DeNapoli, director of ...
Security Boulevard
I wanted to like this report, but … – Fortinet Global Threat Landscape Report 1H 2022
The Thursday edition of ‘Too Long; Did Read’ focuses on Fortinet’s Global Threat Landscape Report for the first half of 2022. In my experience, 7-8 weeks to go from data collection to ...
Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms
Owen Garrett | | Container Security, Kubernetes Security, Multicloud Security, open source, PacketStreamer, Threat Hunting, ThreatStryker, TTPs, Vulnerability Management
PacketStreamer is an open source tool that captures network traffic from multiple remote sources concurrently and aggregates the data into a single pcap log file. It is written in golang and supports network ...
Defending Against Modern Ransomware Tactics
Ransomware gangs are continuing to evolve new tactics and techniques, and organizations need to be better prepared to defend against them in 2022. In the business of extorting money from victims, bad ...
Security Boulevard
Why Understanding Cyber Criminals Behavior and Tools is Vital
Daniel Smith | | Attack Types & Vectors, cybercrime, tactics techniques and procedures, threat landscape, TTPs
By profiling and documenting criminal TTPs network defenders can better understand criminal behavior and how specific attacks are created. The post Why Understanding Cyber Criminals Behavior and Tools is Vital appeared first ...
Countering Network Resident Threats
By Richard Bejtlich, Principal Security Strategist, Corelight Vendors often claim that their products or services counter, mitigate, or otherwise affect “nation state threats.” When I worked as a director of incident response ...