Posts about

Blue Team (3)

SCYTHE & ATT&CK Navigator

How are Blue Teams utilizing SCYTHE? One way the Blue Team can use SCYTHE...

Read More

The Difference Between Cybersecurity Simulation vs Cybersecurity Emulation

In a world where threat actors continuously evolve their cyber attack...

Read More

Adversary Emulation Metrics Time to Detect

Offensive security professionals and program coordinators have a learning...

Read More

How to Defend Against Ransomware

‍ Chris Krebs, former CISA Director At the RSA Conference in 2020, I...

Read More

The continuing pain of PowerShell

Microsoft PowerShell has long been used by system administrators, and in...

Read More

Introduction to Adversary Emulation

What is adversary emulation? Adversary emulation leverages adversary...

Read More

No Rest for the Weary: Breaches are Inevitable

In the past week, we learned that both FireEye and SolarWinds were breached....

Read More

Cuddling the Cozy Bear, Emulating APT29 by Jorge Orchilles - Cyber Junegle

Adversary Emulation is a type of ethical hacking engagement where the...

Read More

Wild West Hackin' Cast by Adam Mashinchi - Quickstart Guide to MITRE ATT&CK: the Do's and Don'ts when using the Matrix

This webcast will provide the audience with a very fast, yet very...

Read More