article thumbnail

MITRE presents ATT&CK for ICS, a knowledge base for ICS

Security Affairs

MITRE announced the initial release of a version of its MITRE ATT&CK knowledge base that focuses on industrial control systems (ICS). Now the organization is going to propose a knowledge base that focused on ICS systems for its MITRE’s ATT&CK. ” reads the official page set up by MITRE.

article thumbnail

Episode 245: How AI is remaking knowledge-based authentication

The Security Ledger

We talk with Matt Salisbury of Honeybadger HQ, which is using AI and machine learning to re-imagine knowledge-based authentication. The post Episode 245: How AI is remaking knowledge-based authentication appeared first on The Security. AI juices knowledge-based authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US CISA published a guide to better use the MITRE ATT&CK framework

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) this week released a new guide for cyber threat intelligence experts on the use of the MITRE ATT&CK framework. In 2018, MITRE announced the MITRE ATT&CK , a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

article thumbnail

MITRE evaluates Enterprise security products using the ATT&CK Framework

Security Affairs

The MITRE Corporation’s ATT&CK framework has been used to evaluate the efficiency of several enterprise security products designed by several vendors. Duff explained MITRE adopt a transparent methodology and knowledge base that will make easy to interpret results obtained with its service. Pierluigi Paganini.

Security 279
article thumbnail

MITRE adds D3FEND defensive cybersecurity techniques to ATT&CK Framework

Security Affairs

D3FEND is a new project promoted by MITRE Corporation aimed to add a knowledge graph of cybersecurity countermeasures to the ATT&CK Framework. National Security Agency (NSA), it proposes a standard approach for the description of defensive cybersecurity countermeasures for techniques used by threat actors. ” states the NSA.

article thumbnail

MITRE released EMB3D Threat Model for embedded devices

Security Affairs

The threat model provides a knowledge base of cyber threats to embedded devices. Multiple partners have contributed to the design of the threat model, including Red Balloon Security, Narf Industries, and Niyo ‘Little Thunder’ Pearson of ONE Gas. ” reads the announcement.

article thumbnail

Identity Thieves Bypassed Experian Security to View Credit Reports

Krebs on Security

Identity thieves have been exploiting a glaring security weakness in the website of Experian , one of the big three consumer credit reporting bureaus. All that was needed was the person’s name, address, birthday and Social Security number. states to place a security freeze on their credit files.

Security 355