FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

By: Newsroom β€” May 24th 2024 at 16:30
The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the threat actor creating rogue virtual machines (VMs) within its VMware environment. "The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access,"
☐ β˜† βœ‡ The Hacker News

China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion

By: Newsroom β€” May 7th 2024 at 12:55
The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence of the intrusion now dates back to December 31, 2023. The attack, which came to light last month, singled out MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE) through the exploitation of two Ivanti Connect Secure zero-day
☐ β˜† βœ‡ The Hacker News

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

By: The Hacker News β€” April 22nd 2024 at 11:05
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and prototyping network. The unknown adversary "performed reconnaissance
☐ β˜† βœ‡ The Hacker News

How to Interpret the 2023 MITRE ATT&CK Evaluation Results

By: The Hacker News β€” September 22nd 2023 at 10:50
Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the annualΒ MITRE Engenuity ATT&CK Evaluation.Β  This testing is critical for evaluating vendors because it’s virtually impossible to evaluate cybersecurity vendors based on their own
☐ β˜† βœ‡ The Hacker News

Identity Threat Detection and Response: Rips in Your Identity Fabric

By: The Hacker News β€” August 14th 2023 at 11:13
Why SaaS Security Is a Challenge In today's digital landscape, organizations are increasingly relying on Software-as-a-Service (SaaS) applications to drive their operations. However, this widespread adoption has also opened the doors to new security risks and vulnerabilities. The SaaS security attack surface continues to widen. It started with managing misconfigurations and now requires a
☐ β˜† βœ‡ The Hacker News

How to Apply MITRE ATT&CK to Your Organization

By: The Hacker News β€” July 11th 2023 at 11:15
Discover all the ways MITRE ATT&CK can help you defend your organization. Build your security strategy and policies by making the most of this important framework. What is the MITRE ATT&CK Framework? MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a widely adopted framework and knowledge base that outlines and categorizes theΒ tactics, techniques, and procedures (TTPs)
☐ β˜† βœ‡ The Hacker News

MITRE Unveils Top 25 Most Dangerous Software Weaknesses of 2023: Are You at Risk?

By: Ravie Lakshmanan β€” June 30th 2023 at 05:44
MITRE has released its annual list of the Top 25 "most dangerous software weaknesses" for the year 2023. "These weaknesses lead to serious vulnerabilities in software," the U.S. Cybersecurity and Infrastructure Security Agency (CISA)Β said. "An attacker can often exploit these vulnerabilities to take control of an affected system, steal data, or prevent applications from working." TheΒ listΒ is
☐ β˜† βœ‡ The Hacker News

Protecting your business with Wazuh: The open source security platform

By: The Hacker News β€” April 10th 2023 at 09:27
Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration. The threat landscape constantly evolves, and it can be overwhelming for businesses to keep up with the latest security trends. Security teams use processes and security solutions to curb these challenges. These solutions include firewalls, antiviruses, data
❌