lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.21.1905020557380.1819@ip-172-30-0-239.ec2.internal>
Date: Thu, 2 May 2019 05:57:49 +0000 (UTC)
From: InfoSec News <alerts@...osecnews.org>
To: isn@...ts.infosecnews.org
Subject: [Newsletter/Marketing] [ISN] MITRE asks vendors to do more to
 detect stealthy hacks

https://www.cyberscoop.com/mitre-asks-vendors-detect-stealthy-hacks/

By Sean Lyngaas
CYBERSCOOP
MAY 1, 2019

As hackers continue to use native programming tools to blend into target 
networks, Mitre Corp. is beginning to test vendors’ ability to detect those 
techniques.

The federally-funded, not-for-profit organization announced Wednesday it would 
throw the stealthy tactics of an infamous hacking group, the 
Russian-government-linked APT29, at several threat-detection products.

But the evaluation is about more than one set of adversaries. The “living off 
the land” techniques, such as hiding in PowerShell scripts, that will be tested 
are increasingly popular with a variety of hacking groups.

“A lot of these techniques are going to be implemented in similar ways from 
different adversaries,” said Frank Duff, Mitre’s lead for evaluations that use 
the organization’s ATT&CK framework.

[...]


--
Subscribe to InfoSec News
https://www.infosecnews.org/subscribe-to-infosec-news/
https://twitter.com/infosecnews_

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ