Slides and videos from ATT&CKcon 6.0 are now posted in an easy to find way. Check out attack.mitre.org/resources/at... to check out our great talks (and Couch Talks) from October, or even check out past ATT&CKcons from that same page.
Slides and videos from ATT&CKcon 6.0 are now posted in an easy to find way. Check out attack.mitre.org/resources/at... to check out our great talks (and Couch Talks) from October, or even check out past ATT&CKcons from that same page.
techcrunch.com/2025/04/29/i...
techcrunch.com/2025/04/29/i...
This week, we’re going to spotlight how Russian threat actors are phishing targets associated with Ukraine and human rights to abuse Microsoft OAuth.
This week, we’re going to spotlight how Russian threat actors are phishing targets associated with Ukraine and human rights to abuse Microsoft OAuth.
Operational Security (OPSEC) is a process designed to protect sensitive information from adversaries.
OPSEC is about keeping important information safe from people who might want to use it against you.
#AdventofCyber
#opsec
Operational Security (OPSEC) is a process designed to protect sensitive information from adversaries.
OPSEC is about keeping important information safe from people who might want to use it against you.
#AdventofCyber
#opsec
~this week in security~ lands every Sunday.
this.weekinsecurity.com
~this week in security~ lands every Sunday.
this.weekinsecurity.com
Moving to TAXII 2.1/STIX 2.1 is more than just a URL change, so the time to get started is yesterday. Please help us spread the word that the end is nigh.
medium.com/mitre-attack...
Moving to TAXII 2.1/STIX 2.1 is more than just a URL change, so the time to get started is yesterday. Please help us spread the word that the end is nigh.
www.bleepingcomputer.com/news/securit...
www.bleepingcomputer.com/news/securit...
#cybersecurity
#cybersecurity