The Complete Security Validation Platform
The Picus Security Control Validation Platform is a Breach and Attack Simulation (BAS) solution that helps you measure and strengthen cyber resilience by automatically and continuously testing the effectiveness of your prevention and detection tools.
Latest Blog Posts
BitCyber @Digital Transformation Indonesia
Booth SG4, Singapore Pavilion, JIEXPO Convention Centre and Theatre 26-27 July 2023Secure Your Digital Transformation Journey with Zero Trust Security SolutionsPurpose built for Zero Trust to...
Cyber Leaders Luncheon – Thu 2 March 2023
NUSS Suntec Guild House, Suntec Tower 5 3 Temasek Blvd, #02-401/402 Suntec City Mall, Singapore 038983 Thu 2 March 2023 12pm to 2pm Dress Code: Business AttireCybersecurity is no longer a luxury,...
Channel Networking Evening – Wed 1 March 2023
NUSS Suntec Guild House, Suntec Tower 5 3 Temasek Blvd, #02-401/402 Suntec City Mall, Singapore 038983 Wed 1 March 2023 5pm to 8pm Dress Code: Business AttireCybersecurity is no longer a luxury, but...
How can You Benefit from the Most Complete
Security Control Validation Platform?
Test your Security Controls 24/7
Validate Readiness Against The Latest Threats
Optimize Prevention & Detection Capabilities
Show the Value of your Investments
Operationalize MITRE ATT&CK
Improve SOC Efficiency and Effectiveness
Download White Papers and Reports to learn more about the Picus Security Validation Platform
Download the BAS White Paper to learn more
What is Breach and Attack Simulation?
Read this Gartner report, ‘What Are the Top Use Cases for Breach and Attack Simulation Technology?’, to learn about the key ways BAS can measure and strengthen your organization’s cyber resilience.
Also discover:
- Defining features of a BAS tool
Important questions that BAS can answer about your security - How BAS compares to pen testing and vulnerability scanning
Access the Gartner Report
See how the Picus Security Validation Platform tests your security controls for Log4shell exploits and Operationalize MITRE ATT&CK Framework in your SOC.
What is Log4Shell Vulnerability?
Apache Log4j is a widely used Java library used in many commercial and open-source software products as a Java logging framework. The CVE-2021-44228 is a remote code execution (RCE) vulnerability that can be exploited without authentication. The vulnerability’s criticality is rated as 10 (out of 10) in the common vulnerability scoring system (CVSS).
The vulnerability exists due to the Log4j processor’s handling of log messages. Apache Log4j2 versions between 2.0 and 2.14.1 do not protect against attacker-controlled LDAP (Lightweight Directory Access Protocol) and other JNDI (Java Naming and Directory Interface) related endpoints. If an attacker sends a specially crafted message, this may result in the loading of an external code class and the execution of that code (RCE).
What are the 4-steps for the immediate mitigation for log4j attacks?
It seems that we will be talking about Log4j for weeks, maybe months to come. Even though a patch for the first Log4j vulnerability (CVE-2021-44228) was released on December 10th, another Log4j vulnerability (CVE-2021-45046) was found on December 14th, 2021.
- Secure public-facing critical assets first
- Validate network security controls
- Utilize your network security controls
- Keep your assets up-to-date but continue to simulate attacks and harden your perimeter security
TEST YOUR SECURITY CONTROLS TO PREVENT LOG4SHELL EXPLOITS WITH PICUS
- Simulate Log4Shell exploits
- Test your WAF, IPS, and NGFW against Log4j attacks
- Uncover gaps in your security controls
- Enable provided prevention signatures to fix gaps
- Secure your network against Log4j attacks
- Continuously validate your security controls and Log4j resilience.
Operationalizing the MITRE ATT&CK Framework for Security Operations Centers (SOCs)
The MITRE ATT&CK Framework is a globally accessible public knowledge base based on real-world observations of adversary operations.
MITRE ATT&CK systematically defines and organizes Tactics, Techniques, and Procedures (TTPs). MITRE ATT&CK has become a common language between security teams to describe TTPs. The other important aspect of MITRE ATT&CK is that it is a community-driven initiative; therefore, it is a compelling framework as the whole global security community can contribute to it. The other aspect of the MITRE ATT&CK framework is that it is not static. The framework expands as new MITRE ATT&CK techniques and tactics are observed.
This video includes the first section of the Operationalizing the MITRE ATT&CK Framework for Security Operations Centers (SOCs) Course of Purple Academy by Picus. It is a micro-course designed for busy professionals. These courses are short (around 1 hour), focused on a particular topic, accessible 24/7, and offered in a convenient, self-paced format. Students who complete a course receive a verifiable badge and certificate.
In the MITRE ATT&CK Matrix for Enterprise, each column represents a tactic (the adversary’s technical goals). To achieve these goals, adversaries use different methods, which are called MITRE ATT&CK techniques. MITRE ATT&CK provides valuable information for each technique and sub-technique, such as metadata, procedure examples, mitigations, and detection to help security teams.
MITRE ATT&CK also provides threat groups that are related to an intrusion activity, as well as software utilized by these threat groups. Briefly, in the life cycle of a cyber attack, a Threat Group uses some techniques or sub-techniques to accomplish their goals (tactics), manually or via some software.
Let’s focus on how MITRE ATTACK can be operationalized. MITRE suggests operationalizing the ATTACK framework in four use cases. The first use case is ‘Threat Intelligence’, which is using ATTACK as a threat intel source. The second one is ‘Adversary Emulation’, which includes using ATTACK to assess your defenses and red teaming. The third use case is ‘Gap Analysis’. In this use case, we use ATTACK to identify defensive gaps. The fourth one is ‘Detection & Analytics’, which includes addressing the identified defensive gaps.
In order to learn how to operationalize MITRE ATT&CK via the four use cases for red teams, blue teams, and purple teams, you can visit the ‘Operationalizing MITRE ATT&CK for SOCs’ course in Purple Academy, which is a give-back project of Picus Security to provide open-access (free) cybersecurity courses to the community. Students who complete the course receive a verifiable certificate as recognition of their efforts. They also earn Continuing Professional Education (CPE) credits.