article thumbnail

Technology Short Take 152

Scott Lowe

Components involved include the open source Kuma service mesh (in turn leveraging Envoy), anycast BGP, and mutual TLS (mTLS). Anders Eknert shows how to do—or at least provides a framework on getting started with—dynamic policy composition with Open Policy Agent (OPA) in this blog post from April 2021.

Storage 79
article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

In some cases they’re taking open source, community-based tools and leveraging them in creative new ways against common threats. Living off the land or fireless malware is a threat actor leveraging the utilities readily available on a system. There are the vendors, right? They have their pitch, their angle.

Tools 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: MITRE ATT&CK Evaluations

ForAllSecure

Vamosi: ATT&CK started as a workshop exercise to document common tactics, techniques and procedures, T TPS that advanced persistent threats used against Windows Enterprise environments, advanced persistent threats are just as they seem. So it's it's a fun time. There's a lot of research that goes into it.

article thumbnail

The Hacker Mind: MITRE ATT&CK Evaluations

ForAllSecure

Vamosi: ATT&CK started as a workshop exercise to document common tactics, techniques and procedures, T TPS that advanced persistent threats used against Windows Enterprise environments, advanced persistent threats are just as they seem. So it's it's a fun time. There's a lot of research that goes into it.