• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Internxt Cloud Storage: Lifetime Subscription for $149

    Internxt Cloud Storage: Lifetime Subscription for $149
  • Precision Electric Screwdriver Set for $54

    Precision Electric Screwdriver Set for $54
  • Bluetooth Remote Control for Apps for $9

    Bluetooth Remote Control for Apps for $9
  • Capsule 3 Laser 1080p Smart Mini Projector for $799

    Capsule 3 Laser 1080p Smart Mini Projector for $799
  • Mars II Pro 500 ANSI Lumen 720p Portable Projector for $549

    Mars II Pro 500 ANSI Lumen 720p Portable Projector for $549
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How to Interpret the 2023 MITRE ATT&CK Evaluation Results

Sep 22, 2023 by iHash Leave a Comment

Sep 22, 2023The Hacker NewsMITRE ATT&CK / Cybersecurity

MITRE ATT&CK Evaluation

Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the annual MITRE Engenuity ATT&CK Evaluation.

This testing is critical for evaluating vendors because it’s virtually impossible to evaluate cybersecurity vendors based on their own performance claims. Along with vendor reference checks and proof of value evaluations (POV) — a live trial — the MITRE results add additional objective input to holistically assess cybersecurity vendors.

Let’s dive into the 2023 MITRE ATT&CK Evaluation results. In this blog, we’ll unpack MITRE’s methodology to test security vendors against real-world threats, offer our interpretation of the results and identify top takeaways emerging from Cynet’s evaluation.

Table of Contents

  • How does MITRE Engenuity test vendors during the evaluation?
  • So, how do you interpret the results?
  • MITRE ATT&CK Results Summary
  • How’d Cynet do?
  • Still have questions?

How does MITRE Engenuity test vendors during the evaluation?

The MITRE ATT&CK Evaluation is performed by MITRE Engenuity and tests endpoint protection solutions against a simulated attack sequence based on real-life approaches taken by well-known advanced persistent threat (APT) groups. The 2023 MITRE ATT&CK Evaluation tested 31 vendor solutions by emulating the attack sequences of Turla, a sophisticated Russia-based threat group known to have infected victims in over 45 countries.

An important caveat is that MITRE does not rank or score vendor results. Instead, the raw test data is published along with some basic online comparison tools. Buyers then use that data to evaluate the vendors based on their organization’s unique priorities and needs. The participating vendors’ interpretations of the results are just that — their interpretations.

So, how do you interpret the results?

That’s a great question — one that a lot of people are asking themselves right now. The MITRE ATT&CK Evaluation results aren’t presented in a format that many of us are used to digesting (looking at you, magical graph with quadrants).

And independent researchers often declare “winners” to lighten the cognitive load of figuring out which vendors are the top performers. In this case, identifying the “best” vendor is subjective. Which, if you don’t know what to look for, can feel like a hassle if you’re already frustrated with trying to assess which security vendor is the right fit for your organization.

With these disclaimers issued, let’s now review the results themselves to compare and contrast how participating vendors performed against Turla.

MITRE ATT&CK Results Summary

The following tables present Cynet’s analysis and calculation of all vendor MITRE ATT&CK test results for the most important measurements: Overall Visibility, Detection Accuracy, and Overall Performance. There are a lot of other ways to look at the MITRE results, but we consider these to be most indicative of a solution’s ability to detect threats.

Overall Visibility is the total number of attack steps detected across all 143 sub-steps. Cynet defines Detection Quality as the percentage of attack sub-steps that included “Analytic Detections – those that identify the tactic (why an activity may be happening) or technique (both why and how the technique is happening).

Additionally, it’s important to look at how each solution performed before the vendor adjusted configuration settings due to missing a threat. MITRE allows vendors to reconfigure their systems to attempt to detect threats that they missed or to improve the information they supply for detection. In the real world we don’t have the luxury of reconfiguring our systems due to missed or poor detection, so the more realistic measure is detections before configuration changes are implemented.

How’d Cynet do?

Based on Cynet’s analysis, our team is proud of our performance against Turla in this year’s MITRE ATT&CK Evaluation, outperforming the majority of vendors in several key areas. Here are our top takeaways:

  • Cynet delivered 100% Detection: (19 of 19 attack steps) with NO CONFIGURATION CHANGES
  • Cynet delivered 100% Visibility: (143 of 143 attack sub-steps) with NO CONFIGURATION CHANGES
  • Cynet delivered 100% Analytic Coverage: (143 of 143 detections) with NO CONFIGURATION CHANGES
  • Cynet delivered 100% Real-time Detections: (0 Delays across all 143 detections)

See the full analysis of Cynet’s performance in the 2023 MITRE ATT&CK Evaluation.

Let’s dive a little deeper into Cynet’s analysis of some of the results.

Cynet was a top performer when evaluating both visibility and detection quality. This analysis illustrates how well a solution does in detecting threats and providing the context necessary to make the detections actionable. Missed detections are an invitation for a breach, while poor quality detections create unnecessary work for security analysts or potentially cause the alert to be ignored, which again, is an invitation for a breach.

MITRE ATT&CK Evaluation

Cynet delivered 100% visibility and perfectly detected every one of the 143 attack steps using no configuration changes. The following chart shows the percentage of detections across all 143 attack sub-steps before the vendors implemented configuration changes. Cynet performed as well as two very large, well known, security companies despite being a fraction their size and far better than some of the biggest names in cybersecurity.

MITRE ATT&CK Evaluation

Cynet provided analytic coverage for 100% of the 143 attack steps using no configuration changes. The following chart shows the percentage of detections that contained important tactic or technique information across the 143 attack sub-steps, again before configuration changes were implemented. Cynet performed as well as Palo Alto Networks, a $76 billion publicly traded company with 50 times the number of employees and far better than many established, publicly traded brands.

MITRE ATT&CK Evaluation

Still have questions?

Understandable.

In this webinar, Cynet CTO Aviad Hasnis and ISMG SVP Editorial Tom Field review the recently released results and share expert advice for cybersecurity leaders to interpret the results to find the vendor that best fits the specific needs of their organization. He’ll also share more details on Cynet’s performance during the tests and how that could translate to your team’s unique goals.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: ATTCK, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, Evaluation, hacker news, hacking news, how to hack, information security, Interpret, MITRE, network security, ransomware malware, results, software vulnerability, the hacker news

Special Offers

  • Internxt Cloud Storage: Lifetime Subscription for $149

    Internxt Cloud Storage: Lifetime Subscription for $149
  • Precision Electric Screwdriver Set for $54

    Precision Electric Screwdriver Set for $54
  • Bluetooth Remote Control for Apps for $9

    Bluetooth Remote Control for Apps for $9
  • Capsule 3 Laser 1080p Smart Mini Projector for $799

    Capsule 3 Laser 1080p Smart Mini Projector for $799
  • Mars II Pro 500 ANSI Lumen 720p Portable Projector for $549

    Mars II Pro 500 ANSI Lumen 720p Portable Projector for $549

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

July 2023 Patch Tuesday: Updates and Analysis

November Patch Tuesday 2023: Updates and Analysis

Nov 30, 2023 By iHash

Paving the way for modern search workflows and generative AI apps

Paving the way for modern search workflows and generative AI apps

Nov 30, 2023 By iHash

Tags

* Apple attacks Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Internxt Cloud Storage: Lifetime Subscription for $149

Expires January 01, 2024 07:00 PST Buy now and get 50% off KEY FEATURES Internxt is a private cloud service suite that protects users’ right to privacy. All Internxt services are designed for complete security, uncompromising privacy, and honest transparency being 100% Open-source, and end-to-end encrypted. Store, share, and send files and photos on the […]

Apple announces expanded partnership with Amkor for silicon packaging

Today Apple announced it will be the first and largest customer of the new Amkor manufacturing and packaging facility being developed in Peoria, Arizona. Amkor will package Apple silicon produced at the nearby TSMC fab, where Apple is also the largest customer.  “Apple is deeply committed to the future of American manufacturing, and we’ll continue […]

Precision Electric Screwdriver Set for $54

Expires December 01, 2123 07:59 PST Buy now and get 31% off KEY FEATURES The Precision Electric Screwdriver Set from HOTO is a must-have kit for effortless and precise screwdriving. With 25 high-quality S2-steel precision bits, including Phillips, Torx, Slotted, Hex, Pozidriv, Square, and Security types, this set ensures you have the right tool for […]

Bluetooth Remote Control for Apps for $9

Expires December 01, 2123 07:59 PST Buy now and get 50% off KEY FEATURES Elevate your experience with our Bluetooth Remote Control! Effortlessly navigate apps, scroll, and capture perfect moments without touching your phone. Ideal for influencers and selfie enthusiasts, our one-touch functions keep you hands-free and fatigue-free. Make awkward family photos a thing of […]

Vulnerability in crypto wallets created online in the early 2010s

Vulnerability in crypto wallets created online in the early 2010s

Researchers have discovered several vulnerabilities in the BitcoinJS library that could leave Bitcoin wallets created online a decade ago prone to hacking. The basic issue is that the private keys for these crypto wallets were generated with far greater predictability than the library developers expected. Randstorm vulnerabilities and consequences Let’s start at the beginning. Researchers […]

Capsule 3 Laser 1080p Smart Mini Projector for $799

Expires April 03, 2027 07:00 PST Buy now and get 0% off KEY FEATURES Wherever you need to go, the Anker Nebula Capsule 3 Laser projector is easy to pack up or hold, weighing only 2.1 pounds. The portable projector is 90% smaller than others with similar brightness. Stop squinting and just lean back to […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT