fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.8K
active users

#ATT

1 post1 participant0 posts today
Someone asked me to compare and contrast ATT&CK and FiGHT matrices...
It's probably wise to consider their respective scopes. ATT&CK describes threats that affect typical enterprise networks whereas FiGHT is dedicated to the equipment that can be found in a typical mobile carrier. This results in a disparity in the relative availability and quality of data from which each is sourced. There is a significant amount of knowledge that exists publicly about enterprises being breached whereas, not only are there less organisations in the mobile carrier bracket but there is also less public disclosure when their assets are affected. The result is that whilst ATT&CK demands evidence in the form of public TI, FiGHT necessarily takes a more speculative approach and new threats can be introduced without need for citable examples in the wild.
We tend to start with ATT&CK even when we're mapping SP networks since the reality is that most mobile carriers are also enterprises and most SPs still need to protect their Windows, Linux and Networking assets against known threats (witness the Salt Typhoon reporting etc) even before they worry about the speculative threats in FiGHT. That's not to say we don't consider mobile specific threats but in many cases, ATT&CK does a sufficient job of describing them such that a specialist such as myself can make the link between the generalised case in ATT&CK and what a more specific version of a threat targetting an SP might look like. As an example, the threat models we produced for stc and others are based on ATT&CK but included consideration for threats targetting assets providing/using SS7, GTP, HLR, VLR etc. The fact is that a breach of the packet core of a mobile carrier is likely to stem from things like weak passwords, missing patches or poor configuration etc, threats that ATT&CK is more than capable of describing.
As far as customer adoption, I'd say start with ATT&CK and worry about FiGHT later. If you're building a SOC, you will get high quality signals from things like firewalls/EDR/OS logs etc if you hunt for things in ATT&CK whereas try the same with FiGHT and it may be a time consuming and ultimately unsuccessful endeavour.
#att&ck, #fight, #threatmodelling

[fr] L’Autorité de la #concurrence (#antitrust) sanctionne #Apple d’une amende de 150 M euros, pour avoir ... abusé de sa position dominante ...

... l’objectif poursuivi par ... #ATT [App Tracking Transparency] n’est pas critiquable ... modalités ... ne sont ni nécessaires ni proportionnées ...

... une multiplication des fenêtres de recueil de #consentement compliquant excessivement ...

autoritedelaconcurrence.fr/fr/

Autorité de la concurrence · Ciblage publicitaire : l’Autorité de la concurrence prononce une sanction de 150 000 000 euros à l’encontre d’Apple en raison de la mise en œuvre du dispositif App Tracking Transparency (« ATT »)

"In 2006, a retired AT&T engineer knocked on the door of the EFF's office in a rundown part of San Francisco's Mission district and asked, "Do you folks care about privacy?" With him he carried schematics exposing the largest US government domestic spying operation since Watergate.

That person was Mark Klein, who died on March 8 this year from cancer. He was 79.

After a life working in telecoms, Klein realized he had helped the NSA wire up a listening station in AT&T's San Francisco switching facility - the infamous Room 641A - that was being used to illegally spy on Americans.

The evidence he gathered and shared led to two lawsuits that exposed the extent to which US citizens were being spied on by their own government in the post-9/11 world. Klein faced legal pressure, death threats, and the constant fear of ruin, to get his story out and tell the public what was going on. But Klein regretted nothing."

theregister.com/2025/03/15/rip

The Register · RIP Mark Klein, the engineer who exposed US domestic spying ops after wiring it upBy Iain Thomson