Connect with us

728x90 banner available here

Latest News

PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks

Published

on

PRE-ATT&CK Techniques: The Key to Preventing Cyber AttacksReading Time: 4 minutes

 

Cyber attackers are now targeting any kind of information that can reward them: from personal data to corporate information to government secrets. However, behind each attack, there is a long chain of thoroughly selected actions.

While most organizations focus their attention on protecting the perimeter of their corporate network, the cybersecurity experts from MITRE advise expanding their ability to understand the behavior of adversaries.

Hackers select their victims long before their attack and carefully collect information about them before executing any malicious actions. Nowadays, the internet provides them with a great variety of data about almost any company, so adversaries can learn enough not only about a company’s activity but also about its cybersecurity weak spots.

To help security officers understand how hackers choose their victims and prevent an attack before it even begins, MITRE, a non-profit corporation that tackles cybersecurity problems, has created the PRE-ATT&CK matrix that is a part of the Adversarial Tactics, Techniques, and Common Knowledge, also known as the ATT&CK framework.

 

What is the PRE-ATT&CK matrix?

PRE-ATT&CK allows security officers to prevent a possible attack before an adversary penetrates into their network. The PRE-ATT&CK matrix contains 15 tactics and more than 150 techniques that explain the adversary planning, information gathering, reconnaissance, and setup when preparing their attack.

The tactics in PRE-ATT&CK explain the typical adversarial techniques and procedures for selecting a victim, obtaining information about it, and launching the cyber attack. This information provides security officers with a broader understanding of adversary behavior before any indicators of compromise appear.

 

PRE-ATT&CK allows security officers to find answers on the following questions:

  •        Are there any signs that cyber attackers are targeting your organization?
  •        What adversary techniques may an attacker apply to your company?
  •        How can you analyze the collected data to notice a hacker’s interest into your organisation?

 

Analyzing the PRE-ATT&CK techniques and tactics, defenders can get a better understanding of cyber attacker activities. They can use this knowledge to make appropriate decisions on what technical measures and mitigations to adopt in order to reduce hacker’s chances on properly preparing an attack on their organization.

 

How to use the PRE-ATT&CK matrix

The PRE-ATT&CK matrix provides detailed information about how adversaries prepare for arranging a cyber attack. The PRE-ATT&CK tactics explain what goals an aversary sets for themselves, while each technique shows how these goals can be achieved. The tactics in PRE ATT&CK reflect such attacker goals:

  •        Priority definition
  •        Victim selection
  •        Gathering information about a victim
  •        Victim weakness identification
  •        Persona development
  •        Capabilities setup

The PRE-ATT&CK techniques show how adversaries perform each tactic and allow enterprise defenders to track and organize attack statistics and patterns.

Priority definition

Using this tactic, an adversary weighs all the pros and cons of arranging an attack. They set their goals by considering how the information they are getting can benefit them and what kind of information has the biggest value for them. At this stage, cyber criminals compare the cost of cyber intrusions with the expected reward from their activity.

Victim selection

Taking into account their priorities, adversaries begin to look for their victims. They take their strategic considerations and then narrow them down tactically and operationally until a victim is selected. Depending on their target, adversaries can decide to attack it directly or through business partners. However, for making the right decision, hackers usually need to collect all possible information about their target.

Gathering information about the victim

After adversaries select their victim, they can’t blindly execute an attack. They first need to gather all information about their target: the type of technical system the victim uses, the personnel that works for the victim, and the victim organization itself.

Attackers usually collect information about their victims by using open-source intelligence tools and techniques. Such data about a victim as organization’s domains, email address format, names of top personnel can be freely found online by combining phishing and social engineering techniques.

While organizations can’t minimize their presence on the internet nowadays, security officers can consider how the public data of their company may be abused and define vectors of possible attacks.

 

Identifying victim weaknesses

By analyzing all the data collected at the previous stage, adversaries can find potential weaknesses of their victim. The discovered vulnerabilities become the basis of creating a plan of the attack. Weakness identification also allows adversaries to test and configure their own systems for attack execution.

At this stage, defenders can consider the Pyramid of Pain that will help them define the importance of indicators of compromise.

 

Persona development

Though the internet is a place where you can find everyone, it’s also a place where anyone can create a fake persona. A hacker can develop their persona by providing a fake email address and personal information to one of the social media sites. Getting in contact with a potential victim, an adversary can gain greater access to the victim’s personal profile with an intention to abuse this data later.

Unfortunately, most social media don’t inform their users whether someone viewed their profile. However, organizations can establish tight privacy control for their corporate accounts in social media by establishing trusted connections, blocking suspicious content, and educating their employees.

 

Capabilities setup

After getting in contact with potential victims, an adversary will establish capabilities for arranging an attack. Though some cyberc riminals may be really technology-savvy, most of them look for the easiest way to maintain their own internet infrastructure.

There are plenty of cost-effective ways to anonymously use servers, autonomous systems, and networks. Adversaries often abuse this anonymity for achieving their malicious goals. Paying just several dollars per month, they can get a virtual presence enough for compromising your organization.

Even if your logs detected adversarial activity from a specific server, it would be very difficult to legally pursue that source because of the lack of evidence. Though it may seem nearly impossible to detect an adversary at this stage of the cyber attack, security teams should pay attention to behavioral patterns that indicate hacker’s activity.

While PRE-ATT&CK describes only the adversarial behavior before an attack, MITRE has recently integrated some PRE-ATT&CK techniques into ATT&CK to let security teams define the potential vectors of attacks on their organizations and improve their security measures accordingly.

Enterprises that integrate PRE-ATT&CK into their security best practices can significantly enhance their protection measures and prevent adversaries long before they actually begin their malicious campaigns.

 

Conclusion

It’s not a secret that cyber attacks are now more targeted than any time before. Cyber criminals carefully select their next victim and conduct a thorough investigation before penetrating into your corporate network. Using the PRE-ATT&CK matrix from MITRE, security teams can reveal the early signs of adversarial behavior and prevent an attack before hackers compromise your organization.  

 

This article is a contribution from Marcell Gogan.  Marcell is a specialist within digital security solutions, business design and development, virtualization and cloud computing, R&D projects, establishment and management of software research direction – working with Ekran System. He also loves writing about data management and cybersecurity. 


Source: Latest News on European Gaming Media Network
This is a Syndicated News piece. Photo credits or photo sources can be found on the source article: PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks

George Miller (Gyorgy Molnar) started his career in content marketing and has started working as an Editor/Content Manager for our company in 2016. George has acquired many experiences when it comes to interviews and newsworthy content becoming Head of Content in 2017. He is responsible for the news being shared on multiple websites that are part of the European Gaming Media Network.

Latest News

N1 Partners launches a promo for N1 Bet: earn extra payouts for your FTDs!

Published

on

N1 Partners has just launched a new campaign for its flagship brand – N1 Bet. Until the end of November partners can boost their payouts by up to +7% when driving traffic to two key Tier-1 GEOs: Australia and Germany.

Promo period: October 16 – November 30
Promo GEOs: Australia (AU), Germany (DE)
Traffic sources: FB, In-App, UAC, Email, SMS, SEO, PPC, ASO, and more.

* How it works: the more FTDs your players bring, the higher your bonus to your CPA.

  • 500–899 FTDs → +5% payout on CPA
  • 900+ FTDs → +7% payout on CPA

* Results for Australia and Germany are combined, as well as all accounts of one participating team within the affiliate network.

Why is it worth focusing on Australia and Germany with N1 Partners?

  • 🇩🇪 Germany (DE) brings steady, high-quality traffic with strong evening activity and players who prefer dynamic slot mechanics.
  • 🇦🇺 Australia (AU) delivers solid conversion on slot-focused content and a loyal base of engaged users.

Joining this promo also boosts your progress in the N1 Puzzle Promo, the massive campaign featuring luxury prizes and the ultimate reward: a Robinson R22 Beta II helicopter. The more traffic you send to N1 Bet, the closer you are to the leaderboard’s top!

N1 Bet is a part of a top iGaming affiliate program and one of N1 Partners strongest and most consistent brands, that offers solid conversion, flexible promos, and smart analytics to help affiliates earn more. With an updated design and an optimized retention funnel, the brand performs equally well across online affiliate programs (slots & live) and sports betting segments.

Work with a brand that delivers – and get the most out of every lead!

For questions or personal assistance, reach out to your Affiliate Manager or our LeadGen Manager Christina via the contacts below:
[email protected]
LinkedIn
Telegram

Be number one with N1!

Continue Reading

Latest News

SOFTSWISS Deepens Safer Play as Platinum Partner of Responsible Gambling Summit 2025

Published

on

Reading Time: 2 minutes

SOFTSWISS, an international technology provider with over 15 years in the iGaming sector, has partnered with South African entities for the Responsible Gambling Summit 2025, reinforcing its commitment to safe, sustainable play in one of its key growth regions. The two-day summit, organised by the South African Responsible Gambling Foundation, brings together regulators, operators, and experts to advance harm minimisation and industry collaboration.

The Responsible Gambling Summit 2025 will take place from 13 to 14 November in Johannesburg, South Africa, and will include an awards gala dinner recognising initiatives in safer gambling. The programme spans policy, compliance, innovation, and public education, with sessions on illegal market impacts, regulatory development, and technology’s role in prevention and intervention. A SOFTSWISS representative will join the panel discussion ‘Innovation, Technology, and Responsible Gambling’, which explores emerging risks and mitigation strategies in digital environments.

“Industry partnership is essential to keep responsible gambling and player protection visible, effective, and evidence-based across channels. We greatly value the commitment and partnership of prominent international companies, such as SOFTSWISS, whose support brings expertise and resources to these important initiatives in South Africa,” said Sibongile Simelane-Quntana, Executive Director at the South African Responsible Gambling Foundation.

“South Africa is a priority market for SOFTSWISS, and we are proud to support this summit’s mission to advance safer play through collaboration and technology,” said Miranda Guliashvili, Head of Regional Growth at SOFTSWISS. “We continuously apply responsible gambling best practices in our products to help operators build sustainable, compliant growth.”

Building on this commitment, the SOFTSWISS Anti-Fraud team has delivered measurable results: from January to August 2025, it prevented over 15 million euro in fraudulent transactions, resolved more than 56,000 tasks, and processed 70 player complaints submitted to gaming regulators and forums. As fraud tactics evolve – including attempts to use AI-generated deepfakes during verification – SOFTSWISS is strengthening its tools and processes to help operators maintain a secure, transparent environment.

 

About SOFTSWISS

SOFTSWISS is an international technology company with over 15 years of experience in developing innovative solutions for the iGaming industry. SOFTSWISS provides comprehensive software for managing iGaming projects. The company’s product portfolio includes the Casino Platform, the Game Aggregator with over 35,000 casino games, Affilka Affiliate Platform, the Sportsbook Software and the Jackpot Aggregator. The expert team, based in Malta, Poland, and Georgia, counts over 2,000 employees.

The post SOFTSWISS Deepens Safer Play as Platinum Partner of Responsible Gambling Summit 2025 appeared first on European Gaming Industry News.

Continue Reading

Latest News

Week 42/2025 slot games releases

Published

on

Reading Time: 4 minutes

Here are this weeks latest slots releases compiled by European Gaming

PG Soft, a world-class digital mobile games company, has released its powerful new title, Kraken Gold Rush. PG Soft’s game invites players to embark on the perilous high seas and navigate past The Kraken’s monstrous tentacles, desperate to drag ships into the abyss. Sticky Wilds and multipliers reaching x100 help players hunt down a legendary haul of 10 million gold coins.

Evoplay has launched Velvet Gems, a glamorous slot filled with sparkling stones, seamless gameplay, and high reward potential. The game immerses players in a luxurious realm of shimmering rubies, emeralds, and sapphires, where each spin radiates opulence. Striking visuals and a refined soundtrack create a premium atmosphere, making it a perfect choice for players seeking an elegant, feature-rich experience.

The authorities thought they’d finally locked away The Syndicate, the most notorious crew of fugitives in history. But in Nolimit City’s latest release, Breakout, not even a maximum security prison can hold them. This jailbreak-themed slot adds to the list of this year’s releases; Dead Men Walking, Tsar Wars and Kill Em All.

Think you are brave enough to return to the Castle of Terror? This lab experiment-horror sequel from Big Time Gaming is a bone-chilling adventure packed with electrifying features designed to give you the fright of your life. This is a slot where players find themselves in a spooky lab where they must brace themselves for Bonus Respins that are triggered by landing Scatters.

BGaming brings the party to the reels with the release of its latest slot, Fiesta Clusters. This vibrant, highly volatile slice of action combines the celebratory spirit of Cinco de Mayo with the expressive artistry of Día de los Muertos, delivering vibrant thrills for players and a seasonal spike potential for operators around Halloween.

Push Gaming is set to deliver twice the thrills this Halloween with the release of two new seasonal titles, Tarot Treasures and Tricky Treats. Both games highlight the recent launch of Push Gaming’s new product segmentation. Push Action delivers titles with enhanced layers of mechanics and player interaction, a category which Tarot Treasures proudly joins.

Spinomenal has launched Buffalo Rampage – Hold & Hit 3×3, a 3×3 reel, 5 lines video slot. Buffalo Rampage – Hold & Hit 3×3 unfolds across a sun-scorched desert at dusk, framed by towering cacti and brought to life with a slow-paced and Western-inspired soundtrack that immerses players in the action.

TaDa Gaming, has added some dark magic to its TriLuck slots series with its five reels, three rows and 50 fixed paylines new game, 3 Witch’s Lamp. Green, Purple and Blue Potion Pot Scatters can trigger the bonus game’s free spins, five fixed jackpots, ignite coins for wins and increase the bonus prizes.

Blueprint Gaming has introduced a new four pots mechanic and enlarged 5×3 grid to its latest release, Cash Strike Power Force 5marking an innovative double debut for the internationally recognised series. With various iterations from the Cash Strike family consistently ranking in the supplier’s top 10 revenue-generating markets, the new title builds on the impressive momentum from its predecessors.

Play’n GO invites players underwater in Bubblin’ Riches, a 6×4 slot where golden coins and greedy fish collide for submerged surprises. Set in a playful underwater reef, Bubblin’ Riches brings a burst of colour and charm to the reels. At the heart of the action is a bloated Goldfish with a hoarding habit – every Coin Scatter that lands could feed its fortune, or set off a surprise payout.

Playson turns up the heat in its scorching new release Flaming Bells: Hold and Win, where nostalgic gameplay is reinspired with a 5,000x Grand Jackpot, Extra Bonus Game and valuable Multipliers. Collect symbols gather all visible cash values from the reels, including other Collect icons and the three in-game Jackpot symbol values.

ELA Games beckons players to step into a shadowy realm of sorcery and mystery with its newest release: Witches’ Book. Bathe in the magic as a powerful coven of three witches conjures their spells across the reels, revealing mysterious rewards and surprises. Each spin is a step toward ultimate strength, where massive riches and bubbling magic await.

Amusnet has released its latest online video slot, 27 Wild Shots. This vibrant slot game blends the style of classic fruit games with the charm of a fairytale twist, led by none other than the Little Red Riding Hood herself. The three reels burst with familiar symbols of juicy fruits, reimagined in a lively forest theme.

The post Week 42/2025 slot games releases appeared first on European Gaming Industry News.

Continue Reading

Trending

EEGaming.org is part of HIPTHER, parent brand of various prominent news outlets and international conferences. These platforms and events span a wide range of industries, including Entertainment, Technology, Gaming and Gambling, Blockchain, Artificial Intelligence, Fintech, Quantum Technology, Legal Cannabis, Health and Lifestyle, VR/AR, eSports, and several others. This indicates that EEGaming.org is part of a larger network that focuses on a diverse array of sectors, particularly those related to cutting-edge technology and modern lifestyle trends.

Contact us: [email protected]

Editorial / PR Submissions: [email protected]

Copyright © 2015 - 2025 HIPTHER. All Rights Reserved. Registered in Romania under Proshirt SRL, Company number: 2134306, EU VAT ID: RO21343605. Office address: Blvd. 1 Decembrie 1918 nr.5, Targu Mures, Romania

We are constantly showing banners about important news regarding events and product launches. Please turn AdBlock off in order to see these areas.