"a big way ransomware is great at ruining anyone ’ s day, but it ’ s not like it ’ s some zero - day exploit we ’ re just learning about. i mean, ransomware ’ s been an ongoing issue since 1989 when it very publicly entered the fray via some infected floppy disks. since then, for …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
74%
"as exposed remote desktop protocol ( rdp ) and remote monitoring and management ( rmm ) software, and are more dangerous. ssl vpn, or secure sockets layer vpn, is meant to provide a secure, direct connection between a user and a network. it ’ s great for a ton of businesses, and …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
69%
"one order of tips, tricks & hot takes for cybersecurity | huntress somehow, it ’ s already october. fall is officially upon us, pumpkin spice is back with a vengeance, and we all get to celebrate another cybersecurity awareness month! we ’ ve seen a lot of threats come out of the…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1068Exploitation for Privilege Escalation
63%
"change. for instance, ransomware operators have begun more often implementing bring your own vulnerable driver ( byovd ) tactics to disable defense systems and elevate privileges. if ransomware can strike some of the largest corporations, everyone ’ s at risk — and threat actors …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
54%
"and event management, or siem, you can securely store your vpn logs to always know who ’ s connecting. - review access controls regularly : attackers often target legacy applications and outdated accounts that administrators accidentally left installed. be sure to regularly revie…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1556.006Multi-Factor Authentication
52%
"further in terms of protection than any advanced tool or platform. now, this might be a controversial take, but the human element in cybersecurity is an often forgotten superpower. it ’ s the first line of defense against threats, and can easily be someone ’ s strongest line of d…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.001Spearphishing Attachment
43%
"someone says " gift cards, " hang up. delete the text. et cetera. it ’ s 100 % a scam. big thanks to ethan tancredi, dima kumets, max rogers, alden schmidt, stuart ashenbrenner, and greg linares for contributing their excellent expertise to this blog post."
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Our hottest security tips, tricks, and opinions to kick this Cybersecurity Awareness Month off right.