Featuring MITRE Engenuity Center for Threat-Informed Defense, a long-term community partner!
Many thanks to Jonathan Baker and CTID for continuing their support to #AdversaryVillage at @defcon 32 as well.
More info: https://ctid.io

https://adversaryvillage.org/adversary-events/DEFCON-32/ and https://defcon.org/html/defcon-32/dc-32-villages.html#adversary

Join Adversary Village Discord server: https://adversaryvillage.org/discord
#AdversarySimulation #PurpleTeam #Tradecraft #Tactics #AdversaryEmulation #CTID #MITREEngenuity #ThreatInformedDefense #MITRE

Center for Threat-Informed Defense | MITRE Engenuity

The Center for Threat-Informed Defense is a collaborative R&D organization advancing state-of-the-art defenses against cyber adversaries.

MITRE Engenuity

#AdversaryGuru live-stream series from Adversary Village

Mia Sanchez, Senior Cyber Threat Intelligence Analyst at MITRE, will be talking about "[Cyber Threat Intel] CTI Blueprints: Creating Actionable Reports", an open-source project from the MITRE Engenuity Center for Threat-Informed Defense designed to help analysts create high-quality actionable reports.

Schedule: 15th December at 11:00 AM CST.

More details about the live-stream: https://adversaryvillage.org/live-streaming-series/Mia-Sanchez
Sessions will be live-streamed on our Twitch, YouTube channels and QnA will happen on the Discord server.

Twitch: https://twitch.tv/AdversaryVillage
YouTube: https://youtube.com/AdversaryVillage
Join Discord server for QnA: https://adversaryvillage.org/discord

#adversarysimulation #purpleteaming #adversarytradecraft #adversaryemulation #threatinformedDefense #CTI #threatintel

Mia Sanchez | Adversary Guru Live-stream Series | Adversary Village

Adversary Guru live-streaming series on Adversary Simulation, Purple Teaming and Adversary Tradecraft | Adversary Village

This morning, we're thrilled to publish the @tidalcyber Ultimate Guide to Cyber Threat Profiling. At 57 pages of workflows, tips, resources, and infographics, I’m out of many more words to add here – check it out and let us know what you think!

#threatprofile #threatinformeddefense #mitreattack #DiamondModel #TTP #APT #ransomware #risk #cyber

https://www.tidalcyber.com/ultimate-guide-to-cyber-threat-profiling?utm_campaign=CTI%20Content%202022-23&utm_source=scott-direct&utm_medium=mastodon&utm_term=threat-profiling-ebook

The Ultimate Guide to Cyber Threat Profiling

Do you know what cyber threats matter to your organization? Download The Ultimate Guide to Cyber Threat Profiling to learn how to identify them.

A key part of #threatinformeddefense is focusing on threats relevant to you, but how do you know what threats those are? Developing a cyber threat profile is crucial, but many organizations find the process overwhelming.

We're excited to release our latest ebook, The Ultimate Guide to Cyber Threat Profiling! In this comprehensive guide, our Director of CTI lays out the strategic benefits of threat profiling, how to build your first threat profile, and more.

#threatintel #cybersecurity #cyberthreat

https://hubs.la/Q01R8SHT0

The Ultimate Guide to Cyber Threat Profiling

Do you know what cyber threats matter to your organization? Download The Ultimate Guide to Cyber Threat Profiling to learn how to identify them.

Introducing the newest major @tidalcyber TTP intelligence content roundup, the Initial Access & Malware Delivery Landscape matrix, now live in our free Community Edition platform: https://app.tidalcyber.com/share/43836024-a194-4ac7-9659-b51e88632e7f

The matrix covers 25 major & emerging #malware typically used to gain early footholds in victim environments, often leading to ingress of more impactful threats, especially #ransomware, #infostealers, cryptominers, & more. It includes many recognizable names (#QakBot, #IcedID, #Emotet, #Bumblebee, #Gootloader) plus several newer and less-discussed threats

The matrix includes 13 custom Technique Sets for threats not currently tracked in the #mitreattack knowledge base. All technique references derive from a large volume of recent, public #threat reporting (click the labels in the ribbon at the top of the matrix to view relevant source URLs for each threat)

An interactive link analysis visualization of connections among these threats, also derived from public reports, is also available here: https://onodo.org/visualizations/235067/

Community Edition matrices support easy identification of shared (and outlier) techniques among multiple threats, and quick & easy overlay or pivoting to defensive & offensive security capabilities relevant to your own #security stack. We’ll have a blog out soon reviewing our analysis of top & trending techniques common among these initial access threats

Tidal’s #Adversary Intelligence team remains focused on providing up-to-date #TTPintelligence, especially around traditionally under-represented yet widely relevant threats like crimeware. Other popular matrices in this theme include our Ransomware & Data Extortion Landscape matrix (https://app.tidalcyber.com/share/9a0fd4e6-1daf-4f98-a91d-b73003eb2d6a) and Major & Emerging Infostealers matrix (https://app.tidalcyber.com/share/ec62f5e0-bd40-476b-a560-7ad2779ea9e3), which each cover 20+ threats

Financially motivated adversaries often display a rapid pace of #TTP evolution, and this is especially apparent for #initialaccess threats. Register for our webinar on May 31 dedicated to TTP evolution, its drivers, and discussion around what defenders can do to address it and its implications: https://hubs.la/Q01NC23k0

#SharedWithTidal #threatinformeddefense #malware #infostealer #cryptominer #IAB #blueteam #detectionengineering #purpleteam #cyber

Tidal Cyber

Threat-Informed Defense

We're excited to welcome @loginsoft to the Tidal Product Registry! You can now explore their System-41 analytics to detect potential cyber threats in the Tidal Community Edition, and add them to your matrix to check coverage against specific threat actors or groups. Be sure to check them out!

https://hubs.la/Q01NkXgn0

#tidalproductregistry #threatinformeddefense #threatintel #cybersecurity

Tidal Cyber

Threat-Informed Defense

There's still time to register for our #webinar tomorrow exploring initial access threats and #malware delivery! You won't want to miss this presentation by our Director of CTI will present research on remote access trojans (RATs), loaders, and other initial access threats, and provide recommendations for prioritization. Join us at noon ET tomorrow!

#threatinformeddefense #cybersecurity #initialaccessthreats #threatintel

https://www.brighttalk.com/webcast/19703/578939?utm_source=organic-social&utm_medium=brighttalk&utm_campaign=578939

Initial Access & Malware Delivery Landscape: Top Threats and TTPs

This webcast provides a broad overview of the top cyber threats currently used to gain initial footholds into victim environments and deliver a wide range of other, usually more impactful malware. Our research into loaders, remote access trojans (RATs), and other initial access threats fills a notable community knowledge gap by aggregating the TTPs associated with newer or resurging threats, including SocGholish, Gootloader, Raspberry Robin, IcedID, BumbleBee, Emotet, and more, and aligning them to a common lexicon (MITRE ATT&CK®) for quicker pivoting into defensive actions. Although many of these threats are responsible for high infection volumes and are notoriously adept at modifying their TTPs, there has yet to be a comprehensive survey of how techniques might be shared (or differ) among the various operations, campaigns, & malware. This session will especially spotlight common early-stage attack techniques and overlaps in second- or later-stage payloads, helping defenders identify opportunities to prioritize their work and make the most efficient use of finite time & resources.

BrightTALK

The Enterprise Edition of the Tidal Platform was created to help CISOs and large organizations reap the benefits of adversary behavior data and #threatinformeddefense. In this blog, our CEO discusses how the Enterprise Edition builds on MITRE ATT&CK® and the benefits it brings to security leaders. Check it out!

#ciso #threatintel #cybersecurity

https://www.tidalcyber.com/blog/announcing-tidal-cyber-enterprise-edition

Announcing Tidal Cyber's Enterprise Edition

Tidal Cyber is excited to launch the Enterprise Edition of its threat-informed defense platform. Read more in this blog from our CEO.

We are excited to announce today that our Enterprise Edition is generally available! The Enterprise Edition fully operationalizes threat-informed defense for large organizations and security teams. It brings a robust feature set including advanced threat profiling, coverage maps, and the Tidal Confidence Score™.

"The Enterprise Edition of the Tidal Cyber platform has helped my team save countless hours as we work to defend Winton," said Edward Millington, Head of Information Security at Winton. "The way that Tidal has operationalized adversary technique data is unique and makes it possible for us to truly adopt threat-informed defense."

Read more in the press release!

#threatinformeddefense #threatintel #cybersecurity #pressrelease #infosec

https://www.tidalcyber.com/newsroom/tidal-cyber-launches-enterprise-edition-of-threat-informed-defense-platform

Tidal Cyber Launches Enterprise Edition of Threat-Informed Defense Platform

Tidal Cyber has launched the Enterprise Edition of its threat-informed defense platform to operationalize threat-informed defense for large enterprises.

Although initial access threats like loaders and remote access trojans are responsible for many infections and notoriously frequently change their TTPs, there hasn't been a full survey of the entire initial access threat landscape. Join us on Thursday, April 13 at noon ET where we'll discuss the full initial access threat threatscape and highlight overlaps to help defenders prioritize their efforts.

#cybersecurity #threatintel #threatintelligence #threatinformeddefense

https://www.brighttalk.com/webcast/19703/578939?utm_source=organic-social&utm_medium=brighttalk&utm_campaign=578939

Initial Access & Malware Delivery Landscape: Top Threats and TTPs

This webcast provides a broad overview of the top cyber threats currently used to gain initial footholds into victim environments and deliver a wide range of other, usually more impactful malware. Our research into loaders, remote access trojans (RATs), and other initial access threats fills a notable community knowledge gap by aggregating the TTPs associated with newer or resurging threats, including SocGholish, Gootloader, Raspberry Robin, IcedID, BumbleBee, Emotet, and more, and aligning them to a common lexicon (MITRE ATT&CK®) for quicker pivoting into defensive actions. Although many of these threats are responsible for high infection volumes and are notoriously adept at modifying their TTPs, there has yet to be a comprehensive survey of how techniques might be shared (or differ) among the various operations, campaigns, & malware. This session will especially spotlight common early-stage attack techniques and overlaps in second- or later-stage payloads, helping defenders identify opportunities to prioritize their work and make the most efficient use of finite time & resources.

BrightTALK