Latest News
PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks
Reading Time: 4 minutes
Cyber attackers are now targeting any kind of information that can reward them: from personal data to corporate information to government secrets. However, behind each attack, there is a long chain of thoroughly selected actions.
While most organizations focus their attention on protecting the perimeter of their corporate network, the cybersecurity experts from MITRE advise expanding their ability to understand the behavior of adversaries.
Hackers select their victims long before their attack and carefully collect information about them before executing any malicious actions. Nowadays, the internet provides them with a great variety of data about almost any company, so adversaries can learn enough not only about a company’s activity but also about its cybersecurity weak spots.
To help security officers understand how hackers choose their victims and prevent an attack before it even begins, MITRE, a non-profit corporation that tackles cybersecurity problems, has created the PRE-ATT&CK matrix that is a part of the Adversarial Tactics, Techniques, and Common Knowledge, also known as the ATT&CK framework.
What is the PRE-ATT&CK matrix?
PRE-ATT&CK allows security officers to prevent a possible attack before an adversary penetrates into their network. The PRE-ATT&CK matrix contains 15 tactics and more than 150 techniques that explain the adversary planning, information gathering, reconnaissance, and setup when preparing their attack.
The tactics in PRE-ATT&CK explain the typical adversarial techniques and procedures for selecting a victim, obtaining information about it, and launching the cyber attack. This information provides security officers with a broader understanding of adversary behavior before any indicators of compromise appear.
PRE-ATT&CK allows security officers to find answers on the following questions:
- Are there any signs that cyber attackers are targeting your organization?
- What adversary techniques may an attacker apply to your company?
- How can you analyze the collected data to notice a hacker’s interest into your organisation?
Analyzing the PRE-ATT&CK techniques and tactics, defenders can get a better understanding of cyber attacker activities. They can use this knowledge to make appropriate decisions on what technical measures and mitigations to adopt in order to reduce hacker’s chances on properly preparing an attack on their organization.
How to use the PRE-ATT&CK matrix
The PRE-ATT&CK matrix provides detailed information about how adversaries prepare for arranging a cyber attack. The PRE-ATT&CK tactics explain what goals an aversary sets for themselves, while each technique shows how these goals can be achieved. The tactics in PRE ATT&CK reflect such attacker goals:
- Priority definition
- Victim selection
- Gathering information about a victim
- Victim weakness identification
- Persona development
- Capabilities setup
The PRE-ATT&CK techniques show how adversaries perform each tactic and allow enterprise defenders to track and organize attack statistics and patterns.
Priority definition
Using this tactic, an adversary weighs all the pros and cons of arranging an attack. They set their goals by considering how the information they are getting can benefit them and what kind of information has the biggest value for them. At this stage, cyber criminals compare the cost of cyber intrusions with the expected reward from their activity.
Victim selection
Taking into account their priorities, adversaries begin to look for their victims. They take their strategic considerations and then narrow them down tactically and operationally until a victim is selected. Depending on their target, adversaries can decide to attack it directly or through business partners. However, for making the right decision, hackers usually need to collect all possible information about their target.
Gathering information about the victim
After adversaries select their victim, they can’t blindly execute an attack. They first need to gather all information about their target: the type of technical system the victim uses, the personnel that works for the victim, and the victim organization itself.
Attackers usually collect information about their victims by using open-source intelligence tools and techniques. Such data about a victim as organization’s domains, email address format, names of top personnel can be freely found online by combining phishing and social engineering techniques.
While organizations can’t minimize their presence on the internet nowadays, security officers can consider how the public data of their company may be abused and define vectors of possible attacks.
Identifying victim weaknesses
By analyzing all the data collected at the previous stage, adversaries can find potential weaknesses of their victim. The discovered vulnerabilities become the basis of creating a plan of the attack. Weakness identification also allows adversaries to test and configure their own systems for attack execution.
At this stage, defenders can consider the Pyramid of Pain that will help them define the importance of indicators of compromise.
Persona development
Though the internet is a place where you can find everyone, it’s also a place where anyone can create a fake persona. A hacker can develop their persona by providing a fake email address and personal information to one of the social media sites. Getting in contact with a potential victim, an adversary can gain greater access to the victim’s personal profile with an intention to abuse this data later.
Unfortunately, most social media don’t inform their users whether someone viewed their profile. However, organizations can establish tight privacy control for their corporate accounts in social media by establishing trusted connections, blocking suspicious content, and educating their employees.
Capabilities setup
After getting in contact with potential victims, an adversary will establish capabilities for arranging an attack. Though some cyberc riminals may be really technology-savvy, most of them look for the easiest way to maintain their own internet infrastructure.
There are plenty of cost-effective ways to anonymously use servers, autonomous systems, and networks. Adversaries often abuse this anonymity for achieving their malicious goals. Paying just several dollars per month, they can get a virtual presence enough for compromising your organization.
Even if your logs detected adversarial activity from a specific server, it would be very difficult to legally pursue that source because of the lack of evidence. Though it may seem nearly impossible to detect an adversary at this stage of the cyber attack, security teams should pay attention to behavioral patterns that indicate hacker’s activity.
While PRE-ATT&CK describes only the adversarial behavior before an attack, MITRE has recently integrated some PRE-ATT&CK techniques into ATT&CK to let security teams define the potential vectors of attacks on their organizations and improve their security measures accordingly.
Enterprises that integrate PRE-ATT&CK into their security best practices can significantly enhance their protection measures and prevent adversaries long before they actually begin their malicious campaigns.
Conclusion
It’s not a secret that cyber attacks are now more targeted than any time before. Cyber criminals carefully select their next victim and conduct a thorough investigation before penetrating into your corporate network. Using the PRE-ATT&CK matrix from MITRE, security teams can reveal the early signs of adversarial behavior and prevent an attack before hackers compromise your organization.
This article is a contribution from Marcell Gogan. Marcell is a specialist within digital security solutions, business design and development, virtualization and cloud computing, R&D projects, establishment and management of software research direction – working with Ekran System. He also loves writing about data management and cybersecurity.
Source: Latest News on European Gaming Media Network
This is a Syndicated News piece. Photo credits or photo sources can be found on the source article: PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks
Latest News
From ‘Mummyverse’ to Crash Games: Belatra Reviews a Landmark 2025
Editor’s Take
Why this matters: Belatra has been a steady hand in the slots world for a long time, but 2025 marked a distinct shift in strategy. By entering the Crash vertical with Goose Boom Bang and winning big at SiGMA Africa, the studio is clearly pivoting to capture the high-growth, high-frequency players in emerging markets. They are no longer just a “classic slots” developer; they are diversifying the portfolio to ensure relevance in regions like LatAm and Africa.
The Full Story
Belatra Games, the specialist online slots developer, has issued a strategic review of its 2025 operations, celebrating a 12-month period defined by entry into new game verticals, significant franchise expansion, and high-profile industry recognition.
The year was characterized by a dual strategy: deepening engagement in established markets while aggressively expanding its content portfolio to suit local preferences in emerging territories.
Portfolio Evolution: Crash and Battles 2025 saw Belatra move beyond its traditional slot roots. The company made its debut in the high-demand Crash game vertical with the launch of Goose Boom Bang, a title designed to tap into the fast-paced gameplay preference of younger demographics.
Additionally, the studio introduced a fresh game concept with the launch of Battles, a new format unveiled for the first time in 2025, with further development planned for 2026.
The ‘Mummyverse’ Expands For fans of classic slots, the highlight of the year was the aggressive expansion of the Mummyverse. Belatra nearly doubled the size of this franchise over the year, making it the most extensive game universe in their entire catalog.
The developer also focused on B2B localization, releasing a number of exclusive bespoke games created specifically for selected operator partners to meet specific local market tastes.
Awards and Recognition The company’s strategic shifts were validated by industry accolades. Belatra secured over 30 nominations throughout the year, with standout wins including:
-
Best Slot Provider (awarded by BitStarz).
-
Most Played Game of 2025 for Make It Gold at the SiGMA Africa Awards.
-
Player’s Pick Award.
Management Commentary Misha Voinich, Head of Business Development at Belatra, commented on the studio’s momentum:
“This year has truly defined who we are as a studio – ambitious, creative and focused on building long-term partnerships. We’ve expanded our universes, launched new ones and entered exciting new markets that will all help us carry this momentum into the New Year.”
The post From ‘Mummyverse’ to Crash Games: Belatra Reviews a Landmark 2025 appeared first on Gaming and Gambling Industry Newsroom.
Latest News
‘Chaos and Soul’: Ebaka Games Plots Global Expansion After Viral Launch
Editor’s Take
Why this matters: The “Instant Game” vertical (Crash, Plinko, Mines) is becoming crowded, but Ebaka Games is cutting through the noise with a distinct brand personality. By securing BMM Testlabs certification so quickly after launch, they are signaling to Tier 1 operators that despite their “chaotic” marketing vibe, the math underneath is solid and compliant. The backing of industry veteran Dmitry Belianin also adds immediate commercial credibility to the startup.
The Full Story
Ebaka Games, the fledgling studio that promises to bring “chaos and soul” to the iGaming sector, has outlined an aggressive growth strategy for 2026 following a landmark launch period in late 2025.
The studio, which officially debuted in November, reports that its initial rollout reached more than five million people worldwide. The launch saw its portfolio go live with the operator Menace, serving as the initial testbed for its mechanics and “Ebaka modes.”
The Product: Instant Games with Personality Ebaka is bypassing traditional slots to focus on the high-growth vertical of fast-paced, instant-win games. Their initial lineup includes:
-
Plinko
-
Mines
-
Tower
-
Limbo
-
Crash
Differentiation is achieved through unique mascots and signature gameplay tweaks designed to offer high win potential and distinct visual identities, moving away from the generic interfaces often found in this genre.
Regulatory Milestone Crucially for its 2026 roadmap, Ebaka Games has confirmed it has secured certification from BMM Testlabs. This accreditation validates the fairness and integrity of its RNG (Random Number Generator) and game engines, removing a major barrier to entry for regulated markets. With this certification in hand, the studio plans to launch with a number of “major brands” in the coming year.
Management Commentary Vitalii Zalievskyi, CEO of Ebaka Games, commented on the studio’s unorthodox approach:
“It’s only been a few weeks since we first introduced Ebaka Games to the world. The feedback has been breathtaking, and it vindicates the decision for us to take a different path to the rest of the industry. You don’t need huge marketing budgets to grab people’s attention if you are building something truly innovative.”
Industry Backing The studio describes itself as being “created by players for players” but boasts significant industry firepower in its corner. The team includes Dmitry Belianin, a well-known figure in the sector who is the co-founder of Blask and Menace, as well as Managing Partner at Already Media.
The post ‘Chaos and Soul’: Ebaka Games Plots Global Expansion After Viral Launch appeared first on Gaming and Gambling Industry Newsroom.
Latest News
Racing Meets Nightlife: SBK Backs ARC’s New ‘Friday Night Live’ Series
Editor’s Take
Why this matters: British racing has a well-documented demographic problem; its core audience is aging. “Friday Night Live” is a direct attempt to fix this by blending high-stakes racing with the “experience economy” (DJs, nightlife vibes) that appeals to Gen Z and Millennials. Bringing SBK on board—a mobile-first, app-only sportsbook—is a perfect demographic fit, while the Racing Post adds the necessary credibility to ensure the actual racing product remains the focus.
The Full Story
Arena Racing Company (ARC) has unveiled the strategic commercial lineup for its upcoming Friday Night Live series, confirming SBK as the Exclusive Betting Partner and The Racing Post as the Official Media Partner.
Set to launch in January 2026, Friday Night Live is a new initiative created in collaboration with youth-focused events company INVADES. The series is designed to overhaul the traditional race day experience, featuring fast-paced fixtures under floodlights, DJ sets, and significant entertainment elements sandwiched between races.
The Commercial Deal
-
SBK: As the exclusive betting partner, the Smarkets-owned sportsbook will take naming rights and on-course branding for all 35 races. Crucially, these races will be broadcast live on mainstream television via ITV Racing as well as Sky Sports Research.
-
The Racing Post: As the Official Media Partner, the publication will provide content, coverage, and promotion across its digital platforms, aiming to bridge the gap between established racing purists and the new audience ARC hopes to attract.
A High-Stakes Experiment The series is not just a marketing exercise; it carries serious sporting weight. Each of the five scheduled nights will feature over £200,000 in prize money. The fixtures will rotate across three of ARC’s all-weather tracks: Wolverhampton, Newcastle, and Southwell.
Management Commentary David Leyden Dunbar, Group Director of Commercial Strategy at ARC, was clear about the target audience:
“We have been very clear that one of the aims of Friday Night Live is to engage the next generation of racing fans… Both [partners] have shown real enthusiasm to work with us… as well as using the platform that these fixtures will offer them to also engage with more established racing and sports fans.”
Adam Baylis, Marketing Director at SBK, added:
“Friday Night Live [is] a fresh and engaging concept that brings a new energy to British racing. SBK has always been built around sport… our focus is on enhancing the live race day experience in a fun, social and responsible way.”
The 2026 Schedule The series kicks off immediately in the new year:
-
9th Jan: Wolverhampton
-
6th Feb: Newcastle
-
20th Feb: Southwell
-
20th March: Wolverhampton
-
27th March: Newcastle
The post Racing Meets Nightlife: SBK Backs ARC’s New ‘Friday Night Live’ Series appeared first on Gaming and Gambling Industry Newsroom.
-
Latest News2 weeks agoSCCG Announces Strategic Partnership with Yellow Elephant Studios to Expand Multi-Channel Gaming Content Worldwide
-
Latest News2 months ago
JioBLAST Launches All Stars vs India powered by Campa Energy: A New Era of Creator-Driven Esports Entertainment
-
eSports2 months ago
CS:GO Betting Gains Momentum in the iGaming Sector
-
Latest News3 weeks ago
THE 2025 PUBG MOBILE GLOBAL CHAMPIONSHIP GROUP STAGE WRAPS UP WITH LAST CHANCE IN SIGHT
-
Latest News1 month ago
S8UL Esports acquires Team Elite’s Free Fire MAX roster to form S8UL Elite
-
Latest News2 months ago
Kambi Group plc Q3 2025 Report
-
Latest News3 months ago
GGPoker Unveils Massive Weekly $100K Freeroll, Kicking Off October 18
-
Latest News2 months ago
RocketPlay wins Best Customer Service at European iGaming Excellence Awards


You must be logged in to post a comment Login