Day one of @mitreattack #attackcon. I’m excited to be back in the DC area and looking forward to speaking with my coworker James Nutland on Akira ransomware. I hope you enjoy!
Exciting news! šŸ“£ Join me at ATT&CK CON 4.0 on October 24-25, 2023, in McLean, VA or online. I'll be presenting alongside my colleague Michael Raggi from Mandiant/Google Cloud. We're unveiling a groundbreaking technique, never seen before, exploiting the .lnk shortcut format. Don't miss out! Register here: [Registration Link](https://na.eventscloud.com/website/58627/) #ATTACKCON #malwareresearch
ATT&CKcon 4.0

MITRE ATT&CKcon | October 24 - 25, 2023

MITRE ATT&CKcon 4.0
#attackcon 4.0
It's coming!

Quick recap MITRE ATT&CK con with several projects and repositories to check out, some ideas and notes also https://hannahsuarez.github.io/2019/mitre-attackcon-2019/

#attackcon #infosec

MITRE ATT&CKCon 2019 - Recap | Articles, Notes and Other Work by hcs0

Recap of livestreaming the MITRE ATTACKcon

Whew! Just finished watching/listening to a 6 hour livestream of MITRE #ATTACKcon (while working). Lots of new ideas and projects to look into.
Tomorrow doing a cloud #security workshop (all day, online).

#ATTACKcon on #purpleteam-ing -- Focus on a single TTP. Rapid emulation and validation allows for more rapid response against high threat activity. Instead of a large engagement, determine if it's an event trigger/s make sure you are covered. (Emma MacMullan, Federal Reserve)

Very nice approach, to go small. No wonder it came out as a response to working in a large enterprise like Federal Reserve.

Livestream: https://www.youtube.com/watch?v=L3KxKAGSJp4&feature=youtu.be

#infosec #watchparty

MITRE ATT&CKcon 2.0 Day Two

YouTube

#ATTACKcon #watchparty Another good visualization is to think of the MITRE ATT&CK Framework as a periodic table of elements, where a mixture of particular elements (ie tactics, techniques, etc) provide a chemical reaction

https://www.youtube.com/watch?v=L3KxKAGSJp4&feature=youtu.be

MITRE ATT&CKcon 2.0 Day Two

YouTube

#ATTACKcon Check out http://mordor.readthedocs.io
The Mordor project provides pre-recorded security events generated by simulated adversarial techniques. The pre-recorded data is categorized by platforms, adversary groups, tactics and techniques defined by the Mitre ATT&CK Framework.

https://github.com/hunters-forge/mordor

#infosec

Mordor documentation — Mordor 0.0.1 documentation

#ATTACKcon #watchparty #infosec #windows #eventlog Check out https://github.com/hunters-forge/api-to-event

A repo focused primarily on documenting the relationships between API functions and security events that get generated when using such functions.

hunters-forge/API-To-Event

A repo to document API functions mapped to security events across diverse platforms - hunters-forge/API-To-Event

#ATTACKcon #watchparty

Nawww I got a shoutout from Katie Nickels, ATT&CK Threat Intelligence Lead, MITRE  

https://www.youtube.com/watch?v=L3KxKAGSJp4

MITRE ATT&CKcon 2.0 Day Two

YouTube