#ATTACKcon

2024-10-22

Day one of @mitreattack #attackcon. I’m excited to be back in the DC area and looking forward to speaking with my coworker James Nutland on Akira ransomware. I hope you enjoy!

2023-09-22

Exciting news! šŸ“£ Join me at ATT&CK CON 4.0 on October 24-25, 2023, in McLean, VA or online. I'll be presenting alongside my colleague Michael Raggi from Mandiant/Google Cloud. We're unveiling a groundbreaking technique, never seen before, exploiting the .lnk shortcut format. Don't miss out! Register here: [Registration Link](na.eventscloud.com/website/586) #ATTACKCON #malwareresearch

A flyer for attckcon.  It reads .lnk tears of our kingdom. On it there are two headshots of the speakers Michael raggi and Andrew northern.
2023-01-12

#attackcon 4.0
It's coming!

2019-10-31

Quick recap MITRE ATT&CK con with several projects and repositories to check out, some ideas and notes also hannahsuarez.github.io/2019/mi

#attackcon #infosec

2019-10-30

Whew! Just finished watching/listening to a 6 hour livestream of MITRE #ATTACKcon (while working). Lots of new ideas and projects to look into.
Tomorrow doing a cloud #security workshop (all day, online).

2019-10-30

#ATTACKcon on #purpleteam-ing -- Focus on a single TTP. Rapid emulation and validation allows for more rapid response against high threat activity. Instead of a large engagement, determine if it's an event trigger/s make sure you are covered. (Emma MacMullan, Federal Reserve)

Very nice approach, to go small. No wonder it came out as a response to working in a large enterprise like Federal Reserve.

Livestream: youtube.com/watch?v=L3KxKAGSJp

#infosec #watchparty

2019-10-30

#ATTACKcon #watchparty Another good visualization is to think of the MITRE ATT&CK Framework as a periodic table of elements, where a mixture of particular elements (ie tactics, techniques, etc) provide a chemical reaction

youtube.com/watch?v=L3KxKAGSJp

2019-10-30

#ATTACKcon Check out mordor.readthedocs.io
The Mordor project provides pre-recorded security events generated by simulated adversarial techniques. The pre-recorded data is categorized by platforms, adversary groups, tactics and techniques defined by the Mitre ATT&CK Framework.

github.com/hunters-forge/mordo

#infosec

2019-10-30

#ATTACKcon #watchparty #infosec #windows #eventlog Check out github.com/hunters-forge/api-t

A repo focused primarily on documenting the relationships between API functions and security events that get generated when using such functions.

2019-10-30

#ATTACKcon #watchparty

Nawww I got a shoutout from Katie Nickels, ATT&CK Threat Intelligence Lead, MITRE :flan_aww:

youtube.com/watch?v=L3KxKAGSJp

2019-10-30

@TheGibson #attackcon #watchparty

11am EDT is "Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate Your Data Analytics!" by makers of HELK (github.com/Cyb3rWard0g/HELK)

2019-10-30

@TheGibson

TIL Misinfosec

The Misinfosec group is where misinformation and information security people meet and learn from each other.

misinfosecproject.github.io/in

#infosec #attackcon

2019-10-29

I really like the idea have a threat/attack framework , and you visualize it like a board game. You land on a 'square' and you can do X, Y, Z.. I mean, not an actual -game board- but more like a visualization technique #ATTACKcon

2019-10-29

We actually change the game for the adversary, maybe it's not tomorrow, maybe it's not next year, but we can get to the point where we're inside the adversary's decision loop. #ATTACKcon

2019-10-29

"Advanced Persistent Defender" #ATTACKcon

2019-10-29

Spent about 7 hours today with the MITRE #livestream learning about various defence techniques. Another full day of #ATTACKcon tomorrow.

There is at least a few things on my to do list incorporating that framework.

2019-10-29
2019-10-29

This is a first - #ATTACKcon presenter from Argentina is channelling 90s-00s Siouxsee & The Banshees goth vibes and I'm loving it.

2019-10-29

#ATTACKcon Loving the whole Indiana Jones theme! "Raiders of the MITRE Framework: How to Build Your Own Threat Library"

Livestream: youtube.com/watch?v=xiUvOGr7Zf

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst