Blog

Read our latest blogs from our expert team.

Brad Freeman Brad Freeman

Automating the MITRE ATT&CK Framework

The MITRE ATT&CK framework is quickly becoming the de-facto tool for describing attacker behaviour. This blog demonstrates how Senseon has integrated ATT&CK into the heart of its platform to automatically map real-world events, enabling security teams to better understand their environments at speed and scale.

Read More
Aaron Gerow Aaron Gerow

Cyber threats evading signatures: Outlier, anomaly or both?

The idea of an outlier is a statistical concept, and like any good concept, it’s helpful. In many areas of statistics, outliers are defined as data points that make it difficult for models to accurately characterise effects and predict outcomes. Given enough data, this difficulty can be measured exactly by scoring data points based on precisely how much they reduce a model’s predictive accuracy on new data.

Read More
Mollie Payne Mollie Payne

Covid-19: Top security tips to keep your team safe whilst working from home

We are beginning to see companies encouraging or enforcing that their staff to work from home, especially in locations where there have been outbreaks of the virus. It is likely that over the coming weeks and months more organisations will choose to close or limit office access to protect their workforce.

But what does this mean for organisations wishing to keep their employees, devices and infrastructure safe from cyber threats?

Read More
Brad Freeman Brad Freeman

Iranian Cyber Attack: The Top 5 Techniques

After the US airstrike on Major General Soleimani tensions have escalated. The risk of offensive cyber operations against new Iranian targets beyond their traditional opponents in the Middle East has increased and it is logical to assume there will be a particular focus on western powers. In this blog we will map known Iranian cyber attack techniques to the MITRE ATT&CK Framework.

Read More
Aamir Mir Aamir Mir

Targeted credential theft attack uncovered by Senseon

Senseon recently detected a credential theft attack via a spear phishing email campaign during a Value Assessment with a global manufacturing company. Senseon detects these types of attacks frequently but very rarely do the attackers leave their source code available for all to see. So I thought I’d take their mistake and use it  as an opportunity to share insights and to remind you what to look out for.

Read More