all InfoSec news
Investigating co-occurrences of MITRE ATT\&CK Techniques. (arXiv:2211.06495v1 [cs.CR])
Nov. 15, 2022, 2:20 a.m. | Md Rayhanur Rahman, Laurie Williams
cs.CR updates on arXiv.org arxiv.org
Cyberattacks use adversarial techniques to bypass system defenses, persist,
and eventually breach systems. The MITRE ATT\&CK framework catalogs a set of
adversarial techniques and maps between adversaries and their used techniques
and tactics. Understanding how adversaries deploy techniques in conjunction is
pivotal for learning adversary behavior, hunting potential threats, and
formulating a proactive defense. The goal of this research is to aid
cybersecurity practitioners and researchers in choosing detection and
mitigation strategies through co-occurrence analysis of adversarial techniques
reported in …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Deputy Chief Information Security Officer
@ City of Philadelphia | Philadelphia, PA, United States
Global Cybersecurity Expert
@ CMA CGM | Mumbai, IN
Senior Security Operations Engineer
@ EarnIn | Mexico
Cyber Technologist (Sales Engineer)
@ Darktrace | London