• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
mitre unveils emb3d: a threat modeling framework for embedded devices

MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices

You are here: Home / General Cyber Security News / MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices
May 13, 2024

The MITRE Corporation has officially manufactured readily available a new risk-modeling framework termed EMB3D for makers of embedded equipment applied in critical infrastructure environments.

“The product delivers a cultivated information base of cyber threats to embedded equipment, offering a popular comprehension of these threats with the security mechanisms demanded to mitigate them,” the non-income reported in a publish saying the move.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


A draft variation of the design, which has been conceived in collaboration with Niyo ‘Little Thunder’ Pearson, Crimson Balloon Security, and Narf Industries, was earlier launched on December 13, 2023.

EMB3D, like the ATT&CK framework, is envisioned to be a “residing framework,” with new and mitigations added and updated about time as new actors, vulnerabilities, and attack vectors arise, but with a unique aim on embedded units.

Cybersecurity

The final objective is to give product distributors with a unified photo of different vulnerabilities in their technologies that are prone to attacks and the security mechanisms for mitigating these shortcomings.

Analogous to how ATT&CK gives a uniform system for monitoring and communicating threats, EMB3D aims to offer a central awareness foundation of threats focusing on embedded units.

“The EMB3D product will deliver a usually means for ICS unit companies to comprehend the evolving threat landscape and opportunity offered mitigations previously in the design and style cycle, ensuing in extra inherently safe equipment,” Pearson observed at the time.

“This will get rid of or lessen the have to have to ‘bolt on’ security soon after the actuality, resulting in much more protected infrastructure and minimized security charges.”

In releasing the framework, the strategy is to embrace a protected-by-layout strategy, thus allowing businesses to release merchandise that have a reduced quantity of exploitable flaws out of the box and have safe configurations enabled by default.

Cybersecurity

Analysis that operational technology (OT) cybersecurity organization Nozomi Networks introduced final year disclosed that danger actors have opportunistically specific industrial environments by exploiting vulnerabilities, abusing qualifications, and phishing for first accessibility, DDoS tries, and trojan execution.

Adversaries, the firm reported, have specially ramped up attacks concentrating on flaws discovered in OT and IoT products utilized throughout foodstuff and agriculture, chemical, drinking water treatment method, manufacturing, and energy sectors.

“EMB3D gives a cultivated expertise foundation of cyber threats to products, like individuals observed in the discipline ecosystem or demonstrated as a result of proofs-of-principle and/or theoretic exploration,” the non-revenue mentioned.

“These threats are mapped to machine attributes to support consumers develop and tailor precise risk versions for specific embedded units. For each individual danger, instructed mitigations are exclusively focused on complex mechanisms that device vendors need to carry out to secure towards the supplied threat, with the purpose of constructing security into the gadget.”

Uncovered this article fascinating? Observe us on Twitter  and LinkedIn to go through much more special articles we put up.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «the 2024 browser security report uncovers how every web session The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Next Post: Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices apple and google launch cross platform feature to detect unwanted bluetooth»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.