Ask HN: Are most security breaches based on social engineering?

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com
Apt

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
  • APT_CyberCriminal_Campagin_Collections

    APT & CyberCriminal Campaign Collection

  • You can look at:

    - A collection of public threat intel reports [0]. Lot's of reading though. I did some Splunking on it last year and at least 50% uses phishing for initial access. You could call that a structural vulnerability.

    - Exploiting vulnerable public facing stuff is another initial access technique. Here someone collected all the CVEs used by ransomware crews:

    - VERIS community database: collection of 8894 security incidents. If you look in the JSON there are some fields describing the vector and the actor.

    [0] https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_C...

    [1] https://twitter.com/uuallan/status/1437068825636265985

    [2] https://github.com/vz-risk/VCDB

  • You can look at:

    - A collection of public threat intel reports [0]. Lot's of reading though. I did some Splunking on it last year and at least 50% uses phishing for initial access. You could call that a structural vulnerability.

    - Exploiting vulnerable public facing stuff is another initial access technique. Here someone collected all the CVEs used by ransomware crews:

    - VERIS community database: collection of 8894 security incidents. If you look in the JSON there are some fields describing the vector and the actor.

    [0] https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_C...

    [1] https://twitter.com/uuallan/status/1437068825636265985

    [2] https://github.com/vz-risk/VCDB

  • WorkOS

    The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.

    WorkOS logo
  • VCDB

    VERIS Community Database

  • You can look at:

    - A collection of public threat intel reports [0]. Lot's of reading though. I did some Splunking on it last year and at least 50% uses phishing for initial access. You could call that a structural vulnerability.

    - Exploiting vulnerable public facing stuff is another initial access technique. Here someone collected all the CVEs used by ransomware crews:

    - VERIS community database: collection of 8894 security incidents. If you look in the JSON there are some fields describing the vector and the actor.

    [0] https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_C...

    [1] https://twitter.com/uuallan/status/1437068825636265985

    [2] https://github.com/vz-risk/VCDB

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts