Malware Tools

A great time learning from other hackers, Jesse Moore shared his slide presentation on Adversary Tactics Configuration Management with the South Sound Hackers meetup.

Takeaways for me included.

Always be prepared – Patch Software

Benchmark Your Starting Point

Biggest Threat to an Organization – 93% from phishing and pretexting;

96% most common attack vector was from Email

Configuration Best Practices:  CIS CAT PRO, CIS Benchmarks and CIS Controls

Mitigation Detection, Check out  ATT&CK  Technique Matrix

I did order my free poster from SAN DFIR, a resource for Digital Resources and Incident Response


Published by Mews News

Blogging from the Pacific Northwest, outdoor enthusiast, photographer, project manager and Certified Digital Forensics Examiner

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: