Security News > 2020 > April > Guardicore Infection Monkey now maps its actions to MITRE ATT&CK knowledge base
Guardicore unveiled new capabilities for its open source Infection Monkey breach and attack simulation tool, used by thousands to review and analyze how their environments may be vulnerable to lateral movement and attacks.
The latest version of Guardicore Infection Monkey now maps its actions to the MITRE ATT&CK knowledge base, providing a new report with the utilized techniques and recommended mitigations, to help security and network infrastructure teams simulate APT attacks and mitigate real attack paths intelligently.
"The MITRE ATT&CK knowledge base is a globally-recognized, comprehensive matrix of tactics and techniques observed in millions of actual attacks, used by enterprise network defenders to better classify attacks and assess risks," said Pavel Gurvich, Co-founder and CEO, Guardicore.
Guardicore Infection Monkey enables cybersecurity and infrastructure architects to automate testing of network defenses by attempting to communicate with machines residing in different segments of the enterprise network, demonstrating policy violations, and generating test results with actionable recommendations for remediation.
Added capabilities for ATT&CK features are available now for immediate download. Guardicore Infection Monkey is available for bare metal Linux and Windows servers, AWS, Azure, VMWare and Docker environments, and private clouds.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/smAVfF3AEkw/