Search results: MITRE

Latest MITRE Endpoint Security Results Show Some Familiar Names on Top

MITRE Engenuity has released the latest round of its ATT&CK endpoint security evaluations, and the results show some familiar names leading the pack with the most detections. The MITRE evaluati...

How to Use MITRE ATT&CK to Understand Attacker Behavior

MITRE ATT&CK ("miter attack") is an up-to-date and widely-used knowledge base that focuses on how attackers think and operate. It’s based on practical use cases, so companies can better evaluate s...

MITRE Expands Security Testing to Services, Deception Tools & More

MITRE is moving beyond its well-regarded endpoint security evaluations and will soon be testing other security services and products. MITRE recently issued a call for participation for ATT&CK E...

MITRE, CISA Reveal Dangerous Hardware & Software Vulnerabilities

It's been an active week for security vulnerabilities, with MITRE and the U.S. Cybersecurity & Infrastructure Agency (CISA) revealing hundreds of critical vulnerabilities. CISA ordered federal ...

MITRE Protection Tests Shed New Light on Endpoint Security

MITRE added a new wrinkle to its latest endpoint detection and response (EDR) evaluations, a test of endpoint security products' ability to stop an adversarial attack. Previous MITRE evaluations and ...

Latest MITRE EDR Evaluations Contain Some Surprises

MITRE Engenuity last month released the latest MITRE ATT&CK evaluations of endpoint security products, and the results contain some pretty big surprises. MITRE doesn't analyze or comment on the...

Software Supply Chain: A Risky Time for Dependencies

The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surf...

Critical F5 BIG-IP Flaw Actively Exploited by Hackers

User's of F5's BIG-IP application services could be vulnerable to a critical flaw that allows an unauthenticated attacker on the BIG-IP system to run arbitrary system commands, create or delete files...

Hackers Are Now Exploiting Windows Event Logs

Hackers have found a way to infect Windows Event Logs with fileless malware, security researchers have found. Kaspersky researchers on May 4 revealed “a new stash for fileless malware.” During a “...

Best Cybersecurity Software & Tools for 2022

Standalone cybersecurity tools are not enough to maintain the security posture of an entire organization. Between malware, phishing attacks, zero-day threats, advanced persistent threats, reconnaiss...

Latest Articles

Popular Categories