What is a Zero-Day Exploit? What Can be Done About Them? In cybersecurity, a zero-day exploit refers to the method a hacker uses to take advantage of a security vulnerability in a computer system, software, or network. When a zero-day…
MITRE ATT&CK
Detecting Microsoft Exchange Zero-Day Exploits
Tags: MITRE ATT&CK | Zero-Day
Category: LogRhythm Labs
Type: Blog
Enriching MITRE ATT&CK Techniques for Better Threat Detection
Tags: MITRE ATT&CK
Category: LogRhythm Labs | Security Tips and Tricks
Type: Webcasts
Network Threat Hunting Made Easy With the MistNet NDR MITRE ATT&CK™ Engine
Tags: MistNet | MITRE ATT&CK
Category: Product News
Type: Blog
Security professionals are widely adopting MITRE ATT&CK™ for network threat hunting. ATT&CK stands for Adversarial Tactics, Techniques and Common Knowledge, and it represents a globally accessible information base of adversary tactics and techniques based on real-world observations. MITRE ATT&CK provides…
LogRhythm MITRE ATT&CK Knowledge Base (KB) Module 2.0
Tags: MITRE ATT&CK
Category: LogRhythm Labs
Type: Blog
Major Update to the LogRhythm MITRE ATT&CK KB Module When LogRhythm originally developed and launched the MITRE ATT&CK Knowledge Base (KB) Module, we worked under MITRE ATT&CK’s version 6. The MITRE ATT&CK framework is constantly developing, and many changes have…
Lateral Movement and How to Detect It
Tags: MITRE ATT&CK | UEBA
Category: Security Tips and Tricks
Type: Blog
You may have heard of the concept of lateral movement within the context of security operations and possess a general idea of how threat actors leverage this tactic to gain access to your data. But what exactly is lateral movement?…