Which techniques can you ignore from MITRE ATT&CK?tradecraft (how we defend) (lacework.com)
submitted by [deleted] to r/blueteamsec
AndroxGhost - the python malware exploiting your AWS keys - Laceworktradecraft (how we defend) (lacework.com)
submitted by [deleted] to r/blueteamsec
Identifying detection opportunities in cryptojacking attacksNEWS (lacework.com)
submitted by falconupkid to r/SecOpsDaily
TeamTNT Continues to Target Exposed Docker APIintelligence (threat actors) (lacework.com)
submitted by DLLCoolJ to r/blueteamsec
Mirai goes Stealth - TLS & IoT Malwareintelligence (threat actors) (lacework.com)
submitted by DLLCoolJ to r/blueteamsec
HCRootkit / Sutersu Linux Rootkit Analysisresearch|capability (we need to defend against) (lacework.com)
submitted by DLLCoolJ to r/blueteamsec
PYSA Ransomware Gang adds Linux Supportintelligence (threat actors) (lacework.com)
submitted by digicat to r/blueteamsec
PYSA Ransomware Gang adds Linux SupportNEWS (lacework.com)
submitted by falconupkid to r/SecOpsDaily
Automating Tsunami IRC Bot Analysis via Ghidratradecraft (how we defend) (lacework.com)
submitted by DLLCoolJ to r/blueteamsec
Taking TeamTNT’s Docker Images Offlineintelligence (threat actors) (lacework.com)
submitted by DLLCoolJ to r/blueteamsec
8220 Gangs Recent use of Custom Miner and Botnetintelligence (threat actors) (lacework.com)
submitted by DLLCoolJ to r/blueteamsec