OpenAI plans to shell out $1 million in grants for projects that empower defensive use-cases for generative AI technology.
The post OpenAI Unveils Million-Dollar Cybersecurity Grant Program appeared first on SecurityWeek.
The all in one place for non-profit security aid.
OpenAI plans to shell out $1 million in grants for projects that empower defensive use-cases for generative AI technology.
The post OpenAI Unveils Million-Dollar Cybersecurity Grant Program appeared first on SecurityWeek.
How to Interpret the MITRE Engenuity ATT&CK® Evaluations For Enterprise
[[{“value”:”
Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organizations. And perhaps no assessment is more widely trusted than the annual MITRE Engenuity ATT&CK Evaluations: Enterprise.
This evaluation is critical for testing vendors because it’s virtually impossible to evaluate cybersecurity vendors based on their own performance claims.
Along with vendor reference checks and proof of value evaluations (POV) — a live trial — in their environment, the MITRE Engenuity results add objective input to assess cybersecurity vendors holistically.
In this piece, we’ll unpack MITRE Engenuity’s most recent methodology to test security vendors against real-world threats, offer our interpretation of the results, and identify the top takeaways emerging from the evaluation of Cynet’s all-in-one security solution.
You can download Cynet’s MITRE engenuity ATT&CK practical guide Here.
The MITRE Engenuity ATT&CK Evaluation is performed by MITRE Engenuity and tests the endpoint protection solutions against a simulated attack sequence based on real-life approaches taken by well-known advanced persistent threat (APT) groups.
The MITRE Engenuity ATT&CK Evaluations: Enterprise tested 29 vendor solutions by emulating the attack sequences of Turla, a sophisticated Russia-based threat group known to have infected victims in over 45 countries.
An important caveat is that MITRE does not rank or score vendor results. Instead, the raw test data is published along with some basic online comparison tools. Buyers then use that data to evaluate the vendors based on their organization’s unique priorities and needs. The participating vendors’ interpretations of the results are just that — their interpretations.
Document
Incident Response – On-Demaind Free Webinar 2024
Leveraging MITRE’s 2023 ATT&CK Evaluation to Supercharge Your Security Strategy
The MITRE Engenuity ATT&CK Evaluation represents one of the industry’s most trusted and in-depth assessments of how competing security solutions perform in real-world attack scenarios.
.
That’s a great question — one that a lot of people are asking themselves right now. The MITRE Engenuity ATT&CK Evaluations: Enterprise results aren’t presented in a format that many of us are used to digesting (looking at you, magical graph with quadrants).
And independent researchers often declare “winners” to lighten the cognitive load of determining which vendors are the top performers. In this case, identifying the “best” vendor is subjective. Which, if you don’t know what to look for, can feel like a hassle if you’re already frustrated with trying to assess which security vendor is the right fit for your organization.
With these disclaimers issued, let’s review the results to compare and contrast how participating vendors performed against Turla.
The following tables present Cynet’s analysis and calculation of all vendor MITRE Engenuity ATT&CK Evaluations: Enterprise test results for the most important measurements: Overall Visibility, Detection Accuracy, and Overall Performance.
There are a lot of other ways to look at the MITRE results, but we consider these to be most indicative of a solution’s ability to detect threats.
Overall Visibility is the total number of attack steps detected across all 143 sub-steps. Cynet defines Detection Quality as the percentage of attack sub-steps that included “Analytic Detections – those that identify the tactic (why an activity may be happening) or technique (both why and how the technique is happening).
Additionally, it’s important to look at how each solution performed before the vendor adjusted configuration settings due to missing a threat.
MITRE allows vendors to reconfigure their systems to attempt to detect threats that they missed or to improve the information they supply for detection. In the real world we don’t have the luxury of reconfiguring our systems due to missed or poor detection, so the more realistic measure is detections before configuration changes are implemented.
Based on Cynet’s analysis, our team is proud of our performance against Turla in the 2023 MITRE Engenuity ATT&CK Evaluations: Enterprise, outperforming the majority of vendors in several key areas. Here are our top takeaways:
Cynet delivered 100% Detection (19 of 19 attack steps) with NO CONFIGURATION CHANGES
Cynet delivered 100% Visibility (143 of 143 attack sub-steps) with NO CONFIGURATION CHANGES
Cynet delivered 100% Analytic Coverage (143 of 143 detections) with NO CONFIGURATION CHANGES
Cynet delivered 100% Real-time Detections (0 Delays across all 143 detections)
Let’s dive a little deeper into Cynet’s analysis of some of the results.
Cynet’s all-in-one security solution was a top performer when evaluating both visibility and detection quality. This analysis illustrates how well a solution detects threats and provides the context necessary to make the detections actionable. Missed detections are an invitation for a breach. In contrast, poor quality detections create unnecessary work for security analysts or potentially cause the alert to be ignored, which, again, is an invitation for a breach.
Cynet delivered 100% visibility and perfectly detected every one of the 143 attack steps using no configuration changes. The following chart shows the percentage of detections across all 143 attack sub-steps before the vendors implemented configuration changes. Cynet performed as well as two very large, well-known, security companies despite being a fraction of their size and far better than some of the biggest names in cybersecurity.
Cynet provided analytic coverage for 100% of the 143 attack steps using no configuration changes. The following chart shows the percentage of detections that contained important general, tactic or technique information across the 143 attack sub-steps, again before configuration changes were implemented. Cynet performed as well as Palo Alto Networks, a $115 billion publicly traded company with 50 times the number of employees, and far better than many established, publicly traded brands.
In this on-demand webinar, Cynet CTO Aviad Hasnis and ISMG SVP Editorial Tom Field review the most recent MITRE ATT&CK results and share expert advice for cybersecurity leaders to find the vendor that best fits the specific needs of their organization. They also unpack Cynet’s performance during the tests and identify opportunities ot advance your team’s goals with the all-in-one security solution.
The post How to Interpret the MITRE Engenuity ATT&CK® Evaluations For Enterprise appeared first on Cyber Security News.
“}]] Read More
Cyber Security News
Notepad++ Seeking your Help to Take Down the Parasite Website
[[{“value”:”
The developers of Notepad++, a widely used text and source code editor, have recently issued a call to action to their user base.
The plea is an urgent one, and it is aimed at addressing a critical issue that requires the community’s immediate attention.
On April 3, 2024, the official website of Notepad++ issued an appeal that aimed to raise awareness about a fraudulent website that has been causing confusion and posing security risks to users.
The appeal was issued in response to a growing concern over the deceptive tactics being employed by the website, which has been causing significant harm to users who unwittingly fall prey to its malicious schemes.
The official statement from Notepad++ highlights the gravity of the situation. The website in question, [https://notepad.plus/], has been misleading users by appearing prominently in search results for those looking to download Notepad++.
Search results
This has led to a significant number of users mistaking the imposter for the official site, resulting in frustration and potential harm.
The Notepad++ team has received a barrage of complaints through various channels, including email, social media, and forums.
Document
Stop Advanced Phishing Attack With AI
AI-Powered Protection for Business Email Security
Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by
other email security solutions. .
Users have expressed their confusion and dissatisfaction, having been duped into believing that the counterfeit site was a legitimate source for downloading Notepad++.
The creators of Notepad++ are concerned about the impact this has had on their community’s trust and the overall user experience.
The deceptive website is described as being “riddled with malicious advertisements on every page.”
These ads are not only a nuisance but are designed to trick users into clicking on them, which can lead to malware infections and other security breaches.
The Notepad++ plugin, mimeTools.dll, was recently compromised and used to inject malicious code.
The hidden agenda of the site is clear: to divert traffic from the genuine Notepad++ website and profit from unsuspecting users.
In response to this threat, Notepad++ is rallying its community to take action. They are urging users to report the fraudulent website to help take it down and prevent further harm.
By reporting the site as harmful, users can contribute to the protection of the Notepad++ community and support the broader goal of maintaining a safe internet environment.
The official Notepad++ website provides a direct link for users to report the malicious software, emphasizing the importance of community vigilance in this fight.
The Notepad++ team is calling on users to join them in this effort by reporting the offending website and spreading awareness of the issue. The collective action of the Notepad++ community can make a significant difference in combating this threat and ensuring a secure online experience for all.
In a digital age where online threats are ever-present, the proactive stance taken by Notepad++ serves as a reminder of the power of community and the importance of safeguarding the tools and platforms that so many rely on.
Secure your emails in a heartbeat! Take Trustifi free 30-second assessment and get matched with your ideal email security vendor – Try Here
The post Notepad++ Seeking your Help to Take Down the Parasite Website appeared first on Cyber Security News.
“}]] Read More
Cyber Security News
Social engineering as a blunt instrument–almost like swatting without the middleman.
Eastern European gangs overcome their reservations about working with anglophone criminals. Mirth Connect is vulnerable to a critical flaw. A look at a mercenary spyware strain. “PepsiCo” as phishbait. Ben Yelin explains the FCC’s renewed interest in Net Neutrality. Our guest is Wade Baker from the Cyentia Institute with insights on measuring risk. And Europol thinks police should take a good look at quantum computing and law enforcement. Read More
The CyberWire