Blog

Snatch Ransomware: CISA Threat Advisory AA23-263A available for testing in Validato

Snatch Ransomware: CISA Threat Advisory AA23-263A is now available for testing in Validato for all existing customers. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a cyber threat advisory relating to Snatch Ransomware, an emerging Ransomware threat actor that first emerged in 2021 and has so far mainly targeted organizations in the Defense, Agriculture,

By |2023-09-21T10:29:31+00:00September 20th, 2023|Blog|Comments Off on Snatch Ransomware: CISA Threat Advisory AA23-263A available for testing in Validato

Threat-Informed Defense: What Is It and How to Implement It?

Many organizations struggle to gauge the true effectiveness of their security controls. Security measures frequently falter without detection and breaches still have significant consequences. Cybersecurity teams require a proactive and straightforward method to consistently monitor the actual performance of their security programs. To address this issue, adopting a Threat-Informed Defense strategy becomes crucial. Through ongoing

By |2023-10-06T15:23:22+00:00September 18th, 2023|Blog|Comments Off on Threat-Informed Defense: What Is It and How to Implement It?

What Is a Cyber Attack Simulation?

In today's digital landscape, where cyber threats continue to evolve and grow in complexity, the importance of cybersecurity cannot be emphasized enough. Organizations across various sectors face the constant risk of cyber attacks, which can have severe consequences ranging from financial losses to reputational damage. To effectively combat these threats, cybersecurity professionals employ a range

By |2023-06-27T10:41:13+00:00June 27th, 2023|Blog|0 Comments

Simulating BianLian Ransomware to Test Defences

On May 16th 2023, the US Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) issued a joint advisory (Advisory AA23-136A) on the emergence of a new Ransomware group, calling themselves BianLian (after the infamous Chinese theatrical costume dances).  BianLian Ransomware has been active in a variety of industry sectors in

By |2023-05-18T14:12:34+00:00May 17th, 2023|Blog|0 Comments

Enhancing SIEM Detections With MITRE ATT&CK Simulations

Introduction Security Information and Event Management (SIEM) platforms are essential tools for detecting and responding to security threats. These systems can analyse and correlate data from various sources to identify potential threats in real-time. However, SIEM systems can become less effective when attackers use advanced or new techniques to evade detection and if they are

By |2023-04-06T09:48:34+00:00April 5th, 2023|Blog|Comments Off on Enhancing SIEM Detections With MITRE ATT&CK Simulations

Red Canary 2023 Global Top Threats Available to Test in Validato

Red Canary 2023 Global Top Threats Available to Test in Validato Validato is happy to announce that it has added the Red Canary Top Threats, as published in the Red Canary 2023 Threat Detection Report, to the Validato platform. This allows Validato customers to instantly test and validate their security control effectiveness and detection capabilities

By |2023-04-01T13:37:12+00:00March 27th, 2023|Blog, News|Comments Off on Red Canary 2023 Global Top Threats Available to Test in Validato

Validato exhibiting at CyberUK 2023

We are delighted to announce that we will be exhibiting at CyberUK in Belfast on the 19th and 20th of April 2023. If you are planning to attend, please stop by the Validato booth and say hello! More information on the event and how to register, visit: https://www.cyberuk.uk/

By |2023-03-30T17:01:49+00:00February 23rd, 2023|Blog, News|Comments Off on Validato exhibiting at CyberUK 2023

US CISA’s recommendation of Security Controls Validation a major milestone

The US CISA (Cybersecurity and Infrastructure Security Agency), an agency of the United States Department of Homeland Security that is responsible for strengthening cybersecurity and infrastructure protection, issued an advisory alert recently that urges US firms to make use of Security Control Validation tools to regularly verify the effectiveness of security controls. In a Ransomware

By |2023-03-30T17:01:49+00:00February 20th, 2023|Blog|Comments Off on US CISA’s recommendation of Security Controls Validation a major milestone

Simulating MITRE ATT&CK techniques using Breach & Attack Simulation (BAS)

Simulating MITRE ATT&CK techniques using Breach & Attack Simulation (BAS) Simulating MITRE ATT&CK techniques using Breach and Attack Simulation (BAS) is becoming a powerful tool for cyber security professionals to test and improve cyber defences. By replicating the tactics, techniques, and procedures (TTPs) used by real-world cyber adversaries, BAS tools can help companies to identify

By |2023-03-30T17:01:50+00:00February 8th, 2023|Blog|Comments Off on Simulating MITRE ATT&CK techniques using Breach & Attack Simulation (BAS)

Will Breach and Attack Simulation replace manual penetration testing?

Will Breach and Attack Simulation (BAS) replace manual penetration testing?   That is the question that many CISOs and security professionals are looking to understand in 2023.  Breach and Attack Simulation is a relatively new niche part of the cyber security tools market, but one that is growing rapidly.  Frost & Sullivan Research estimates that the

By |2023-03-30T17:01:50+00:00January 12th, 2023|Blog|Comments Off on Will Breach and Attack Simulation replace manual penetration testing?
Go to Top