Linking pages
- Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers - Microsoft Security Blog https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/ 211 comments
- Container security best practices: Comprehensive guide – Sysdig https://sysdig.com/blog/container-security-best-practices/ 68 comments
- GitHub - ARPSyndicate/awesome-intelligence: A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources https://github.com/ARPSyndicate/awesome-intelligence 40 comments
- GitHub - veeral-patel/how-to-secure-anything: How to systematically secure anything: a repository about security engineering https://github.com/veeral-patel/how-to-secure-anything 29 comments
- A few thoughts about Uber's breach https://cendyne.dev/posts/2022-09-19-a-few-thoughts-about-ubers-breach.html 24 comments
- New sophisticated email-based attack from NOBELIUM - Microsoft Security Blog https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/ 24 comments
- The Githubification of InfoSec. Towards a more open, contributor… | by John Lambert | Medium https://medium.com/@johnlatwc/the-githubification-of-infosec-afbdbfaad1d1 24 comments
- GitHub - veeral-patel/how-to-secure-anything: How to systematically secure anything: a repository about security engineering https://github.com/veeral-patel/learn-security-engineering 20 comments
- SimuLand: Understand adversary tradecraft and improve detection strategies - Microsoft Security Blog https://www.microsoft.com/security/blog/2021/05/20/simuland-understand-adversary-tradecraft-and-improve-detection-strategies/ 13 comments
- Disclosing the BLOODALCHEMY backdoor — Elastic Security Labs https://www.elastic.co/security-labs/disclosing-the-bloodalchemy-backdoor 13 comments
- GitHub - mikeroyal/Open-Source-Security-Guide: Open Source Security Guide. Learn all about Security Standards, Frameworks, Threat Models, Encryption, and Benchmarks. https://github.com/mikeroyal/Open-Source-Security-Guide 11 comments
- GitHub - praetorian-inc/purple-team-attack-automation: Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs https://github.com/praetorian-inc/purple-team-attack-automation 10 comments
- The Enchiridion of Impetus Exemplar https://shellsharks.com/threat-modeling 9 comments
- Why Action Bias Is Damaging Your Cyber Security Response (And How To Fix it) https://www.securitynewspaper.com/2022/06/14/why-action-bias-is-damaging-your-cyber-security-response-and-how-to-fix-it/ 8 comments
- GitHub - LetsDefend/SOC-Interview-Questions: SOC Interview Questions https://github.com/LetsDefend/SOC-Interview-Questions 7 comments
- Building an open-source SIEM: combining ELK, Wazuh HIDS and Elastalert for optimal performance | by Security Shenanigans | InfoSec Write-ups https://medium.com/@securityshenaningans/building-a-siem-combining-elk-wazuh-hids-and-elastalert-for-optimal-performance-f1706c2b73c6 6 comments
- COM XSL Transformation: Bypassing Microsoft Application Control Solutions (CVE-2018-8492) – bohops https://bohops.com/2019/01/10/com-xsl-transformation-bypassing-microsoft-application-control-solutions-cve-2018-8492/ 6 comments
- GitHub - 0xrawsec/whids: Open Source EDR for Windows https://github.com/0xrawsec/whids 5 comments
- GitHub - mikeroyal/Linux-Guide: Linux Guide. Learn about Linux Hardware vendors, Linux in the Cloud, Desktop Environments, Window Mangers, Linux Distributions, Linux Security, Graphics (AMD/NVIDIA/Intel ARC), and Software Apps. https://github.com/mikeroyal/Linux-Guide 5 comments
- “LokiBot,” the malware that steals your most sensitive data, is on the rise | Ars Technica https://arstechnica.com/information-technology/2020/09/lokibot-the-malware-that-steals-your-most-sensitive-data-is-on-the-rise/ 5 comments
Related searches:
Search whole site: site:attack.mitre.org
Search title: MITRE ATT&CK®
See how to search.