norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.4K
active users

#cyberdefense

1 post1 participant0 posts today

New Open-Source Tool Spotlight 🚨🚨🚨

"Threat-Informed Defense" isn't just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. #CyberDefense #MITREATTACK

Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&CK framework. Precision matters. #ThreatIntelligence #Cybersecurity

Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. #SOCtools #ThreatModeling

TRAM leverages automation to map CTI reports directly to MITRE ATT&CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. #CyberThreats #MITREATTACK

Building effective cyber analytics requires depth; "Summiting the Pyramid" delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. #CyberAnalytics #ThreatHunting

🔗 Project link on #GitHub 👉 github.com/center-for-threat-i

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

#SB Technology (hereinafter referred to as "the Company") announces that #NobuhiroTsuji, a security researcher at the Company, will participate as an expert in the Japan Cybersecurity Initiative by Google Cybersecurity Research Center (hereinafter referred to as "the Initiative"), an effort to raise cybersecurity awareness in Japanese society, which is led by the Google Cybersecurity Research Center.
#CyberDefense #Japan #SoftBank #CyberSecurity
softbanktech.co.jp/en/news/top

Das Citizen Lab veröffentlichte kürzlich seine Untersuchung zu Paragon Solutions, einem Cyber-Defense-Unternehmen, das kürzlich mit einer Spyware-Kampagne gegen Journalisten auf WhatsApp in Verbindung gebracht wurde. Neben der kanadischen Provinzpolizei Ontario fanden Forscher heraus, dass auch Regierungen in Australien, Zypern, Dänemark, Israel und Singapur zu den potenziellen Kunden von Paragon gehören könnten...

techcrunch.com/2025/03/19/rese

TechCrunch · Researchers name six countries as likely customers of Paragon's spyware | TechCrunch

🚀 Kunai pushes further integration with MISP!

This week, we've made significant progress in bridging Kunai with @misp to enhance threat intelligence sharing. Our focus has been on developing kunai-to-misp, a new tool available at github.com/kunai-project/pykun, which processes Kunai logs and creates MISP events to streamline collaboration.

With this, it is now possible to both update MISP from Kunai and feed Kunai from MISP using the misp-to-kunai tool. Here's a practical workflow example:

1️⃣ Analyze a #linux malware sample with Kunai Sandbox (github.com/kunai-project/sandb)
2️⃣ Use kunai-to-misp on the collected Kunai logs
3️⃣ (Optional) Review attributes' IDS flag to maximize detections and reduce false positives
4️⃣ Use misp-to-kunai to distribute the results across all Kunai endpoints

Additionally, we're leveraging MISP’s data model to craft meaningful MISP objects and relationships, offering a clear visual representation of events inside MISP.

🔗 Try it out and let us know what you think!