Search results: MITRE

MITRE ResilienCyCon: You Will Be Breached So Be Ready

Speakers at last week's MITRE ResilienCyCon conference had a surprisingly candid message for attendees: You will likely be breached at some point so focus on the controls and response capabilities yo...

MSSPs Fare Well in First MITRE Evaluations

If MITRE Engenuity's new MSSP evaluations are any indication, managed security service providers are a little like children from Lake Wobegon: They're all above average. Of the 15 MSSPs that parti...

25 Most Dangerous Software Vulnerabilities & Flaws Identified by MITRE

MITRE has released its latest list of the top 25 most exploited vulnerabilities and exposures found in software. The MITRE CWE list is different from the product-specific CVE lists from the U.S. C...

Latest MITRE Endpoint Security Results Show Some Familiar Names on Top

MITRE Engenuity has released the latest round of its ATT&CK endpoint security evaluations, and the results show some familiar names leading the pack with the most detections. The MITRE evaluati...

How to Use MITRE ATT&CK to Understand Attacker Behavior

MITRE ATT&CK ("miter attack") is an up-to-date and widely-used knowledge base that focuses on how attackers think and operate. It’s based on practical use cases, so companies can better evaluate s...

MITRE Expands Security Testing to Services, Deception Tools & More

MITRE is moving beyond its well-regarded endpoint security evaluations and will soon be testing other security services and products. MITRE recently issued a call for participation for ATT&CK E...

MITRE, CISA Reveal Dangerous Hardware & Software Vulnerabilities

It's been an active week for security vulnerabilities, with MITRE and the U.S. Cybersecurity & Infrastructure Agency (CISA) revealing hundreds of critical vulnerabilities. CISA ordered federal ...

MITRE Protection Tests Shed New Light on Endpoint Security

MITRE added a new wrinkle to its latest endpoint detection and response (EDR) evaluations, a test of endpoint security products' ability to stop an adversarial attack. Previous MITRE evaluations and ...

Latest MITRE EDR Evaluations Contain Some Surprises

MITRE Engenuity last month released the latest MITRE ATT&CK evaluations of endpoint security products, and the results contain some pretty big surprises. MITRE doesn't analyze or comment on the...

John the Ripper: Password Cracking Tutorial and Review

John the Ripper is a popular password cracking tool that can be used to perform brute-force attacks using different encryption technologies and helpful wordlists. It’s often what pen-testers and ethic...

Latest Articles

Popular Categories