{"id":3131,"date":"2019-11-20T07:42:37","date_gmt":"2019-11-19T23:42:37","guid":{"rendered":"https:\/\/kirin.mycycraft.com\/declawing-the-bear-cycraft-joins-round-two-of-the-mitre-attck-evaluations\/"},"modified":"2022-04-27T14:42:04","modified_gmt":"2022-04-27T06:42:04","slug":"declawing-the-bear-cycraft-joins-round-two-of-the-mitre-attck-evaluations","status":"publish","type":"post","link":"https:\/\/kirin.mycycraft.com\/ja\/declawing-the-bear-cycraft-joins-round-two-of-the-mitre-attck-evaluations\/","title":{"rendered":"Declawing the Bear : CyCraft joins Round Two of the MITRE ATT&CK Evaluations"},"content":{"rendered":"
[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”5460″ animation=”None” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][vc_column_text]\n<\/p>
Tweeted from @MITREattack 30 October 2019<\/p>\n
With over 1,200 cybersecurity vendors in the market today, only twenty-one of those selected<\/a> were confident enough to participate in round two of the MITRE ATT&CK evaluations. We at CyCraft<\/a> are excited to join the MITRE ATT&CK evaluations against the simulation of APT29\/Cozy Bear.<\/p>\n For the majority of cybersecurity’s short history, security vendors have been hunting and labeling malware, which now numbers over 10 billion. As we venture further into the 21st century, modern adversary’s TTP (tactics, techniques, and procedures) leverage not just malware but also a diverse array of precise and adept techniques. In only seven years, MITRE ATT&CK has become THE codex for cybersecurity vendors and security analysts from finance, healthcare, energy, manufacturing, retail, and government to better understand modern adversarial behavior, especially as their tradecraft expands from information theft and fraud, to espionage, disinformation, and even sabotage.<\/p>\n The most valuable thing MITRE ATT&CK<\/a> has given the cybersecurity industry is a common language and framework to discuss and analyze the capabilities of an attacker’s TTP. Having the ATT&CK framework allows clients to better understand the behaviors of an adversary instead of analyzing the endless malware (adversary’s tools). Due to the level of sophistication in modern-day cyber attacks, the Cyber Kill Chain model<\/a> alone is incapable of fully capturing and narrating an attack. The MITRE ATT&CK framework documents and catalogs adversarial behavior over 330 attack techniques broken down into 12 different categories. In joining the latest round of MITRE ATT&CK evaluations, we at CyCraft seek to tell the world that we are ready to defend against modern-day threats and attacks — even APT29.<\/p>\n[\/vc_column_text][image_with_animation image_url=”5463″ animation=”Fade In” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”75%” max_width_mobile=”default”][vc_column_text]\n