INFORM-Framework: Bedrohungsbasierte Cybersicherheit messbar machen

Strategische Verteidigungsplanung mit neuem Messansatz

Die MITRE Cyber Threat Intelligence Division (CTID) präsentiert INFORM, ein webbasiertes Bewertungsinstrument für bedrohungsorientierte Sicherheitsarchitekturen

https://www.all-about-security.de/inform-framework-bedrohungsbasierte-cybersicherheit-messbar-machen/

#mitre #framework #cyberthreat #cybersecurity #RedTeam

INFORM-Framework: Bedrohungsbasierte Cybersicherheit messbar machen

MITRE CTID stellt INFORM vor – ein webbasiertes Tool zur Bewertung bedrohungsorientierter Verteidigungsstrategien. Die Weiterentwicklung von M3TID bietet Unternehmen konkrete Handlungsempfehlungen.

All About Security Das Online-Magazin zu Cybersecurity (Cybersicherheit). Ransomware, Phishing, IT-Sicherheit, Netzwerksicherheit, KI, Threats, DDoS, Identity & Access, Plattformsicherheit
You have discovered a new vulnerability? Submit it here and we will assign a CVE in no time. https://vuldb.com/?id.add #vuldb #cna #cve #mitre #nvd

----------------

🛠️ Tool
===================

Opening: TDO Standalone Extractor is a self-contained tool for extracting Cyber Threat Intelligence (CTI) from documents. It targets analysts who need structured CTI from heterogeneous sources and automates conversion to machine-readable schemas.

Key Features:
• Multi-format support: processes PDF, DOCX, TXT, and Markdown inputs.
• Comprehensive schema: emits a CTI schema covering 12 entity types and 24 relationship types with rich properties.
• LLM integration: leverages Google Gemini models with automatic fallback parsing for resilient extraction.
• Detection & flow outputs: generates evidence-backed detection opportunities and an Attack-Flow JSON mapping to MITRE ATT&CK.
• Structured reliability: uses pydantic schemas to validate outputs and report parsing success.
• Parallel processing: supports concurrent file processing with progress tracking and job controls.

Technical Implementation:
• Core extraction relies on LLM-driven entity and relation parsing with structured output prompts and schema validation using pydantic models.
• Gemini serves as the primary model with configurable model selection and retry/backoff parameters conceptually managed via environment configuration.
• Outputs include per-file {filename}_extracted.json and human-readable Markdown summaries; optional artifacts include Attack Flow JSON and CSV summaries.

Use Cases:
• Automating ingestion of vendor reports and feeds into CTI platforms.
• Producing detection rule candidates with supporting evidence for SOC engineers.
• Feeding structured ATT&CK flow artifacts into threat modeling and reporting pipelines.

Limitations:
• Dependence on external LLM access and model availability for parsing fidelity.
• Quality of extraction tied to input document clarity and LLM hallucination risk; validation via pydantic mitigates schema errors but not semantic gaps.
• No built-in deployment orchestration; environment-based configuration required conceptually for API keys and model selection.

References:
• pydantic schema validation
• MITRE ATT&CK mapping

🔹 tool #cti #pydantic #MITRE #LLM

🔗 Source: https://github.com/Blevene/standalone_tdo

GitHub - Blevene/standalone_tdo

Contribute to Blevene/standalone_tdo development by creating an account on GitHub.

GitHub

Пробуем на вкус техники MITRE ATT&CK — T1547.001 Ключи запуска в реестре — Папка автозагрузки

Этой статьей я начинаю цикл «Пробуем на вкус техники MITRE ATT&CK». Суть данного цикла - изучать логи, сформированные одной из реализаций той или иной техники MITRE ATT&CK (далее MA). Необходимоеуточнение — не все реализации той или иной техники будут рассмотрены, так как я буду выбирать интересные лично для меня и, возможно, предложенные в комментариях.

https://habr.com/ru/articles/979656/

#SOC #ИБ #MITRE

Пробуем на вкус техники MITRE ATT&CK — T1547.001 Ключи запуска в реестре — Папка автозагрузки

Вступление Фолза, фолза, фолза...... как же все устали от фолзы... вот и я устал... Ты думал, что устроившись работать в SOC аналитиком будешь раскрывать крутые инциденты и выводить хакера на чистую...

Хабр
MITRE

Explore the various resources that MITRE has made available to the cyber security community.

TryHackMe
Mitre (MTRE3) aprova dividendos e divide pagamento em duas parcelas

Construtora mantém disciplina financeira.

Guia do Investidor

Inside the attack chain: Threat activity targeting Azure Blob Storage - https://www.redpacketsecurity.com/inside-the-attack-chain-threat-activity-targeting-azure-blob-storage/

#threatintel
#Azure Blob Storage
#Cloud Storage Security
#Microsoft Defender for Storage
#MITRE ATT&CK
#Threat Intelligence

Inside the attack chain: Threat activity targeting Azure Blob Storage - RedPacket Security

Azure Blob Storage, like any object data service, is a high-value target for threat actors due to its critical role in storing and managing massive amounts of

RedPacket Security

Inside the attack chain: Threat activity targeting Azure Blob Storage - https://www.redpacketsecurity.com/inside-the-attack-chain-threat-activity-targeting-azure-blob-storage/

#threatintel
#Azure Blob Storage
#Cloud Storage Security
#Microsoft Defender for Storage
#MITRE ATT&CK
#Threat Intelligence

MITRE shares 2025's top 25 most dangerous software weaknesses

MITRE has shared this year's top 25 list of the most dangerous software weaknesses behind over 39,000 security vulnerabilities disclosed between June 2024 and June 2025.

BleepingComputer
2025 MITRE CWE Top 25, XSS still #1, w/ SQLi, CSRF, & broken/missing authorization close behind. “Basic” web security, access-control design, & memory-safety bugs (OOB, UAF, buffer overflows) are still where attackers win.🔗https://zurl.co/zwmI9 #MITRE #AppSec #CyberSecurity
CWE - 2025 CWE Top 25 Most Dangerous Software Weaknesses

Common Weakness Enumeration (CWE) is a list of software and hardware weaknesses.