social.coop is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Fediverse instance for people interested in cooperative and collective projects. If you are interested in joining our community, please apply at https://join.social.coop/registration-form.html.

Administered by:

Server stats:

479
active users

#cyberdefense

1 post1 participant0 posts today

New Open-Source Tool Spotlight 🚨🚨🚨

"Threat-Informed Defense" isn't just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. #CyberDefense #MITREATTACK

Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&CK framework. Precision matters. #ThreatIntelligence #Cybersecurity

Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. #SOCtools #ThreatModeling

TRAM leverages automation to map CTI reports directly to MITRE ATT&CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. #CyberThreats #MITREATTACK

Building effective cyber analytics requires depth; "Summiting the Pyramid" delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. #CyberAnalytics #ThreatHunting

🔗 Project link on #GitHub 👉 github.com/center-for-threat-i

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

#SB Technology (hereinafter referred to as "the Company") announces that #NobuhiroTsuji, a security researcher at the Company, will participate as an expert in the Japan Cybersecurity Initiative by Google Cybersecurity Research Center (hereinafter referred to as "the Initiative"), an effort to raise cybersecurity awareness in Japanese society, which is led by the Google Cybersecurity Research Center.
#CyberDefense #Japan #SoftBank #CyberSecurity
softbanktech.co.jp/en/news/top

The best ICS testing results don’t come from a single approach. Onsite testing has to be risk-averse, and lab testing can uncover deeper vulnerabilities. The key? A combined approach…
 
OT environments don't stand up to regular IT pen testing. Any pen tester that doesn't fully understand that could easily destroy systems and take out critical infrastructure.
 
By strategically selecting devices for lab testing based on onsite insights, you get the best of both worlds without unnecessary risk or cost.
 
In our latest blog, Head of Hardware Andrew Tierney explains how this method finds hidden threats in ICS networks: pentestpartners.com/security-b

🚀 Kunai pushes further integration with MISP!

This week, we've made significant progress in bridging Kunai with @misp to enhance threat intelligence sharing. Our focus has been on developing kunai-to-misp, a new tool available at github.com/kunai-project/pykun, which processes Kunai logs and creates MISP events to streamline collaboration.

With this, it is now possible to both update MISP from Kunai and feed Kunai from MISP using the misp-to-kunai tool. Here's a practical workflow example:

1️⃣ Analyze a #linux malware sample with Kunai Sandbox (github.com/kunai-project/sandb)
2️⃣ Use kunai-to-misp on the collected Kunai logs
3️⃣ (Optional) Review attributes' IDS flag to maximize detections and reduce false positives
4️⃣ Use misp-to-kunai to distribute the results across all Kunai endpoints

Additionally, we're leveraging MISP’s data model to craft meaningful MISP objects and relationships, offering a clear visual representation of events inside MISP.

🔗 Try it out and let us know what you think!

Replied in thread

@mcc @Infoseepage ah, makes sense. That's why I use Linux personally (for decades now). None of that AI stuff, unless you purposefully install it. IMHO Windows is great for gaming (tho many of my titles run on Linux now. Yay!), and in the enterprise of course (where I get my paycheck lol), and that's it.

Something to keep in mind, W10 hits EOL this October, so it won't be patched further after then. #APT groups will increase attacks using #0days once MSFT ceases official support exponentially.

You can still disable #Copilot in the registry of W11 24H3 (Pro and Enterprise SKUs, not Home as far as I can find). Not sure how long that will last though as #MSFT pushes hard to further integrate AI in everything they offer. At least on the Enterprise side they give us #sysadmins control over a lot of that. Consumers have much less control. It's either you embrace it, or change to a different platform.

Unfortunately (or fortunately), Linux is the only non-AI embedded OS left that I'm aware of. The next release of #macOS has #AppleIntelligence built in, #iOS 18.0 and later has it baked in, the latest release of #ChromeOS for Enterprise has #Gemini baked in, and #Android13 has #Gemini baked in on supported devices. As you know, W10 has Copilot optional with supporting hardware, W11 is baked in but can be toggled off. W12 will be a fully AI-OS.

Even still, if you're running any of the latest #IntelUltra processors, they have AI built-in at the hardware level. The new #AMDRyzen processors are doing the same.

I decided to embrace the AI evolution rather than fight it. I use my knowledge and skills to protect myself, my family, and my company as much as is possible, and keep abreast of developments in the sector...I also use AI for #cyberdefense. Only way to keep up with the threat landscape anymore.

For now, I still have control of my bubble lol, and that's about all I can do anymore, short of going completely dark. Not quite there yet lol.