Connect with us

Powered

728x90 banner available here

Latest News

PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks

Published

on

PRE-ATT&CK Techniques: The Key to Preventing Cyber AttacksReading Time: 4 minutes

 

Cyber attackers are now targeting any kind of information that can reward them: from personal data to corporate information to government secrets. However, behind each attack, there is a long chain of thoroughly selected actions.

While most organizations focus their attention on protecting the perimeter of their corporate network, the cybersecurity experts from MITRE advise expanding their ability to understand the behavior of adversaries.

Hackers select their victims long before their attack and carefully collect information about them before executing any malicious actions. Nowadays, the internet provides them with a great variety of data about almost any company, so adversaries can learn enough not only about a company’s activity but also about its cybersecurity weak spots.

To help security officers understand how hackers choose their victims and prevent an attack before it even begins, MITRE, a non-profit corporation that tackles cybersecurity problems, has created the PRE-ATT&CK matrix that is a part of the Adversarial Tactics, Techniques, and Common Knowledge, also known as the ATT&CK framework.

 

What is the PRE-ATT&CK matrix?

PRE-ATT&CK allows security officers to prevent a possible attack before an adversary penetrates into their network. The PRE-ATT&CK matrix contains 15 tactics and more than 150 techniques that explain the adversary planning, information gathering, reconnaissance, and setup when preparing their attack.

The tactics in PRE-ATT&CK explain the typical adversarial techniques and procedures for selecting a victim, obtaining information about it, and launching the cyber attack. This information provides security officers with a broader understanding of adversary behavior before any indicators of compromise appear.

 

PRE-ATT&CK allows security officers to find answers on the following questions:

  •        Are there any signs that cyber attackers are targeting your organization?
  •        What adversary techniques may an attacker apply to your company?
  •        How can you analyze the collected data to notice a hacker’s interest into your organisation?

 

Analyzing the PRE-ATT&CK techniques and tactics, defenders can get a better understanding of cyber attacker activities. They can use this knowledge to make appropriate decisions on what technical measures and mitigations to adopt in order to reduce hacker’s chances on properly preparing an attack on their organization.

 

How to use the PRE-ATT&CK matrix

The PRE-ATT&CK matrix provides detailed information about how adversaries prepare for arranging a cyber attack. The PRE-ATT&CK tactics explain what goals an aversary sets for themselves, while each technique shows how these goals can be achieved. The tactics in PRE ATT&CK reflect such attacker goals:

  •        Priority definition
  •        Victim selection
  •        Gathering information about a victim
  •        Victim weakness identification
  •        Persona development
  •        Capabilities setup

The PRE-ATT&CK techniques show how adversaries perform each tactic and allow enterprise defenders to track and organize attack statistics and patterns.

Priority definition

Using this tactic, an adversary weighs all the pros and cons of arranging an attack. They set their goals by considering how the information they are getting can benefit them and what kind of information has the biggest value for them. At this stage, cyber criminals compare the cost of cyber intrusions with the expected reward from their activity.

Victim selection

Taking into account their priorities, adversaries begin to look for their victims. They take their strategic considerations and then narrow them down tactically and operationally until a victim is selected. Depending on their target, adversaries can decide to attack it directly or through business partners. However, for making the right decision, hackers usually need to collect all possible information about their target.

Gathering information about the victim

After adversaries select their victim, they can’t blindly execute an attack. They first need to gather all information about their target: the type of technical system the victim uses, the personnel that works for the victim, and the victim organization itself.

Attackers usually collect information about their victims by using open-source intelligence tools and techniques. Such data about a victim as organization’s domains, email address format, names of top personnel can be freely found online by combining phishing and social engineering techniques.

While organizations can’t minimize their presence on the internet nowadays, security officers can consider how the public data of their company may be abused and define vectors of possible attacks.

 

Identifying victim weaknesses

By analyzing all the data collected at the previous stage, adversaries can find potential weaknesses of their victim. The discovered vulnerabilities become the basis of creating a plan of the attack. Weakness identification also allows adversaries to test and configure their own systems for attack execution.

At this stage, defenders can consider the Pyramid of Pain that will help them define the importance of indicators of compromise.

 

Persona development

Though the internet is a place where you can find everyone, it’s also a place where anyone can create a fake persona. A hacker can develop their persona by providing a fake email address and personal information to one of the social media sites. Getting in contact with a potential victim, an adversary can gain greater access to the victim’s personal profile with an intention to abuse this data later.

Unfortunately, most social media don’t inform their users whether someone viewed their profile. However, organizations can establish tight privacy control for their corporate accounts in social media by establishing trusted connections, blocking suspicious content, and educating their employees.

 

Capabilities setup

After getting in contact with potential victims, an adversary will establish capabilities for arranging an attack. Though some cyberc riminals may be really technology-savvy, most of them look for the easiest way to maintain their own internet infrastructure.

There are plenty of cost-effective ways to anonymously use servers, autonomous systems, and networks. Adversaries often abuse this anonymity for achieving their malicious goals. Paying just several dollars per month, they can get a virtual presence enough for compromising your organization.

Even if your logs detected adversarial activity from a specific server, it would be very difficult to legally pursue that source because of the lack of evidence. Though it may seem nearly impossible to detect an adversary at this stage of the cyber attack, security teams should pay attention to behavioral patterns that indicate hacker’s activity.

While PRE-ATT&CK describes only the adversarial behavior before an attack, MITRE has recently integrated some PRE-ATT&CK techniques into ATT&CK to let security teams define the potential vectors of attacks on their organizations and improve their security measures accordingly.

Enterprises that integrate PRE-ATT&CK into their security best practices can significantly enhance their protection measures and prevent adversaries long before they actually begin their malicious campaigns.

 

Conclusion

It’s not a secret that cyber attacks are now more targeted than any time before. Cyber criminals carefully select their next victim and conduct a thorough investigation before penetrating into your corporate network. Using the PRE-ATT&CK matrix from MITRE, security teams can reveal the early signs of adversarial behavior and prevent an attack before hackers compromise your organization.  

 

This article is a contribution from Marcell Gogan.  Marcell is a specialist within digital security solutions, business design and development, virtualization and cloud computing, R&D projects, establishment and management of software research direction – working with Ekran System. He also loves writing about data management and cybersecurity. 


Source: Latest News on European Gaming Media Network
This is a Syndicated News piece. Photo credits or photo sources can be found on the source article: PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks

George Miller (Gyorgy Molnar) started his career in content marketing and has started working as an Editor/Content Manager for our company in 2016. George has acquired many experiences when it comes to interviews and newsworthy content becoming Head of Content in 2017. He is responsible for the news being shared on multiple websites that are part of the European Gaming Media Network.

Latest News

Manuel “ManuBachoore” Bachoore Wins FC Pro World Championship at 2025 Esports World Cup, Securing Team Liquid’s Third Club Championship Title

Published

on

Reading Time: 2 minutes

 

Bachoore claims his second World Championship with a 5-3 victory as Team Liquid make history as the first club to win three titles in a single Esports World Cup.

Manuel “ManuBachoore” Bachoore has won the FC Pro World Championship at 2025 Esports World Cup for Team Liquid in a 5-3 grand final win against Brice “Brice” Masson of Team Vitality, picking up Team Liquid’s third championship title at this year’s event.

ManuBachoore’s victory sees him become a two-time world champion within the scene, having won the World Championship in 2023, adding another trophy to his cabinet. ManuBachoore claimed a top eight finish at the 2024 Esports World Cup, and ever since favourite and world number one Anders “Vejrgang” Vejrgang was eliminated, ManuBachoore has looked like the most likely winner.

ManuBachoore made it to the World Championship stage via the play-ins, where he only dropped one match in the group stage, topping his group. His main event run proved more difficult, with multiple matches being won by just one goal, proving the intensity of the high-level competition. The grand final was a close match, with ManuBachoore’s signature attacking style on display against his French rival, where goals were traded between the pair. The final moments proved a tense affair, with ManuBachoore leading by just one goal however, he was able to score a late goal to make it 5-3, which ended up sealing the championship in his favour.

“I’m so thankful to god, for me to be two-time World Champion is more than I ever asked for in my career. Honestly, I did not think it was possible to win two times. But here we are, I can’t believe it. It feels like a dream. It is my dream. I’m happy it’s a reality,” said Manuel “ManuBachoore” Bachoore.

When asked if he thought he could win the title, he replied, “If you asked me after I lost in England [ePremier League 2025], I would say no chance. It would be impossible. You could feel that within Team Liquid, that maybe the other guys were getting more flowers, and rightly so. I was a bit forgotten. I’m sure they won’t forget me now.”

Manuel “ManuBachoore” Bachoore earned Team Liquid 1000 Club Championship points for his victory, sending his Club firmly to the top of the Club Championship standings. The victory in EA Sports FC 25 is Team Liquid’s third victory at the Esports World Cup 2025, marking the first time a Club has won three titles at the same Esports World Cup. The result blows the Club Championship wide open, with Team Falcons having just one top eight finish this weekend, as we head into the final two weeks.

Team Liquid’s victory in EA Sports FC 25 not only gained them 1000 Club Championship points, but also denied third-place Team Vitality 250 more crucial points. Team Vitality remain in third place; however, the strong showing in EA Sports FC 25 has seen them bridge the gap to Team Falcons in second place to just 550 points.

The post Manuel “ManuBachoore” Bachoore Wins FC Pro World Championship at 2025 Esports World Cup, Securing Team Liquid’s Third Club Championship Title appeared first on European Gaming Industry News.

Continue Reading

Latest News

RELATABLE NAMES WILL OCHOA DIRECTOR OF INTERNATIONAL SALES TO LEAD GLOBAL EXPANSION STRATEGY

Published

on

Reading Time: < 1 minute

With a focus on new markets and global partnerships, Ochoa will help bring Relatable’s playful, trend-driven products to audiences worldwide.

Relatable, the modern entertainment and consumer products company that transforms social media trends into engaging products for Gen Z, millennials and their families, has appointed Will Ochoa as Director of International Sales. Ochoa will lead international sales strategy and execution as the company accelerates global expansion and deepens its presence across key markets.

“Relatable’s growth has been nothing short of incredible, evolving from a viral game into a global force across multiple categories,” said Ochoa. “I’m incredibly excited to help bring this momentum to new regions and retail channels. My focus will be on building strategic partnerships, deepening relationships with our distributors and retailers, and unlocking new market opportunities as we continue expanding our international footprint.”

Ochoa brings a wealth of experience from the international toy, licensing and entertainment industries, having recently served as Chief Commercial Officer at Toikido and General Manager at Zuru Toys, where he oversaw the company’s commercial operations in Europe. He has a strong background in global distribution and retail, with a track record of building cross-market relationships and driving sales growth across diverse territories.

“Will has a great understanding of the international landscape and brings a strong balance of experience and entrepreneurial energy to the role,” said Ben Kaplan, Co-Founder and Partner of Relatable. “He’s a fantastic addition to the team as we work toward our next phase of global growth.”

In his new role, Ochoa will focus on scaling Relatable’s presence in priority global markets, shaping go-to-market strategies, and collaborating closely with regional teams and partners to support international product rollouts.

For more information on Relatable’s products, visit relatable.com.

 

The post RELATABLE NAMES WILL OCHOA DIRECTOR OF INTERNATIONAL SALES TO LEAD GLOBAL EXPANSION STRATEGY appeared first on European Gaming Industry News.

Continue Reading

Latest News

Logifuture-powered Bet9ja partners with heavyweight boxing sensation Moses Itauma

Published

on

Reading Time: 2 minutes

 

Sponsorship deal announced ahead of headline Dillian Whyte bout in Saudi Arabia

Bet9ja – Nigeria’s leading sportsbook, powered by Logifuture – has announced a partnership with heavyweight boxing sensation Moses Itauma.

Itauma, a 20-year-old British fighter of Nigerian descent, has rapidly become one of boxing’s most compelling figures, with an unbeaten professional record, having stopped 10 of his 12 opponents since turning professional in 2023.

The sponsorship deal comes as Itauma prepares for the biggest fight of his career – against Britain’s Dillian Whyte in a headline bout in Saudi Arabia on Saturday (August 16).

Bet9ja’s logo will be prominently displayed on Itauma’s training gear, as well as his ringside team’s clothing during fights. He is also contributing to a series of videos and digital content that fans will enjoy via Bet9ja’s social channels.

For Bet9ja, this sponsorship reflects their deep commitment to supporting Nigerian excellence in sports. As Nigeria’s number one sportsbook, Bet9ja, with Logifuture’s cutting-edge technology and marketing power behind it, continues to push boundaries.

Earlier this year, Bet9ja announced its renewed support for Nigeria national football team’s “Let’s Do It Again” campaign in the build up to the 2025 Africa Cup of Nations.

Bet9ja is powered by Logifuture, a leading provider of iGaming products, including Simulate and Zoom Soccer – flagship virtual sports titles that are transforming the way sports fans engage with their favourite sports, while providing increased revenues and consistent margins for operators.

Itauma said: “I’m delighted to be working with Bet9ja as I prepare for the biggest fight of my career so far. My Nigerian heritage and family have always been a source of pride, and this partnership is a powerful connection to my roots. I look forward to bringing my championship belts back to my father’s homeland.”

Logifuture Head of Content and Social Media Tom Beck said: “Moses Itauma is one of the most exciting young talents in global boxing.

“Moses has spoken about the strength he draws from his Nigerian roots and that makes him a natural fit for Bet9ja. For fans, he represents something special; a proud symbol of Nigerian toughness, talent and ambition on the global stage.

“Supporting his success means a lot to Logifuture and Bet9ja, and even more to our audience. We are looking forward to helping to share his journey with fans by providing exclusive access and behind-the-scenes content as he continues to build his reputation as one of the most explosive young fighters on the planet.”

Ayo Ojuroye, CEO of Bet9ja, said: “We’re incredibly excited to welcome Moses Itauma to the Bet9ja family. Moses embodies the spirit of resilience, power, and relentless pursuit of greatness that we champion. His Nigerian roots and global ambition make him a perfect fit for Bet9ja’s vision of empowering champions and delivering world-class player experiences. Partnering with Logifuture, we continue to elevate the standards of engagement in Nigerian sports.”

The post Logifuture-powered Bet9ja partners with heavyweight boxing sensation Moses Itauma appeared first on European Gaming Industry News.

Continue Reading

Trending

EEGaming.org is part of HIPTHER, parent brand of various prominent news outlets and international conferences. These platforms and events span a wide range of industries, including Entertainment, Technology, Gaming and Gambling, Blockchain, Artificial Intelligence, Fintech, Quantum Technology, Legal Cannabis, Health and Lifestyle, VR/AR, eSports, and several others. This indicates that EEGaming.org is part of a larger network that focuses on a diverse array of sectors, particularly those related to cutting-edge technology and modern lifestyle trends.

Contact us: [email protected]

Editorial / PR Submissions: [email protected]

Copyright © 2015 - 2025 HIPTHER. All Rights Reserved. Registered in Romania under Proshirt SRL, Company number: 2134306, EU VAT ID: RO21343605. Office address: Blvd. 1 Decembrie 1918 nr.5, Targu Mures, Romania

We are constantly showing banners about important news regarding events and product launches. Please turn AdBlock off in order to see these areas.