{"id":6127,"date":"2025-01-13T11:48:13","date_gmt":"2025-01-13T10:48:13","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6127"},"modified":"2025-01-13T11:48:13","modified_gmt":"2025-01-13T10:48:13","slug":"hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/","title":{"rendered":"Hodnotenie ATT&amp;CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup  ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1024x536.png\" alt=\"BVF MITRE 2024\" class=\"wp-image-6128\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1024x536.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-300x157.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-768x402.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-370x194.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-760x398.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>N\u00e1stroj Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu zaznamenal po\u010das hodnotenia v\u00fdznamn\u00fd pr\u00ednos v\u00a0spr\u00e1ve incidentov.<\/em><\/p>\n\n\n\n<p><em>N\u00e1zory a\u00a0stanovisk\u00e1 vyjadren\u00e9 v\u00a0tomto blogovom pr\u00edspevku s\u00fa n\u00e1zormi a\u00a0stanoviskami spolo\u010dnosti ESET a\u00a0nemusia nevyhnutne odr\u00e1\u017ea\u0165 n\u00e1zory alebo postoje organiz\u00e1cie MITRE Engenuity.<\/em><\/p>\n\n\n\n<p>V&nbsp;tohtoro\u010dnom hodnoten\u00ed ATT&amp;CK\u00ae Evaluations zameranom na&nbsp;<a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/er6\/\">segment ve\u013ek\u00fdch firiem<\/a> vytvorila organiz\u00e1cia MITRE tri scen\u00e1re \u00fatoku: scen\u00e1r \u201eK\u00f3rejsk\u00e1 \u013eudovodemokratick\u00e1 republika (K\u013dDR)\u201c na&nbsp;testovanie kybernetickej \u0161pion\u00e1\u017ee v&nbsp;syst\u00e9me macOS, scen\u00e1r \u201eCl0p\u201c na&nbsp;testovanie ransomv\u00e9rov\u00e9ho \u00fatoku na&nbsp;syst\u00e9m Windows a&nbsp;scen\u00e1r \u201eLockBit\u201c na&nbsp;testovanie ransomv\u00e9rov\u00e9ho \u00fatoku na&nbsp;firemn\u00fa infra\u0161trukt\u00faru so&nbsp;serverom Linux a&nbsp;pracovn\u00fdmi stanicami a&nbsp;servermi Windows.<\/p>\n\n\n\n<p>ESET Inspect preuk\u00e1zal vo\u00a0v\u0161etk\u00fdch uveden\u00fdch scen\u00e1roch v\u00fdborn\u00fd preh\u013ead, pri\u010dom detegoval ka\u017ed\u00fd krok \u00fatoku a\u00a0z\u00e1rove\u0148 udr\u017eal celkov\u00fd po\u010det (objem) detekci\u00ed na\u00a0n\u00edzkej \u00farovni. Na\u00a0z\u00e1klade detekci\u00ed vygenerovan\u00fdch z\u00a0\u00fatokov sa pomocou n\u00e1stroja Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect automaticky vytvoril komplexn\u00fd obraz o\u00a0incidentoch, \u010do na\u0161im bezpe\u010dnostn\u00fdm analytikom poskytlo koncentrovan\u00fd poh\u013ead na\u00a0\u00fatoky, v\u010faka ktor\u00e9mu dok\u00e1zali ihne\u010f pochopi\u0165, ako k\u00a0nim krok za\u00a0krokom do\u0161lo.<\/p>\n\n\n\n<p>Pre lep\u0161iu predstavu o\u00a0tom, ako sa spolo\u010dnosti ESET darilo, si prejdeme niektor\u00e9 zmeny v\u00a0metodike, ktor\u00e9 zaviedla organiz\u00e1cia MITRE, a\u00a0potom sa pozrieme na\u00a0to, ako Incident Creator prispel k\u00a0efekt\u00edvnej\u0161iemu preh\u013eadu a\u00a0pracovn\u00fdm postupom bezpe\u010dnostn\u00fdch analytikov pou\u017e\u00edvaj\u00facich riadiaci panel ESET Inspect.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Metodika<\/h2>\n\n\n\n<p>Toto hodnotenie prinieslo nieko\u013eko premyslen\u00fdch zmien v&nbsp;metodike scen\u00e1rov detekcie, ktor\u00e9 pod\u013ea n\u00e1s lep\u0161ie odr\u00e1\u017eaj\u00fa pr\u00e1cu bezpe\u010dnostn\u00e9ho analytika pri rie\u0161en\u00ed re\u00e1lnych kybernetick\u00fdch \u00fatokov.<\/p>\n\n\n\n<p>Po&nbsp;prv\u00e9, telemetria u\u017e nie je <a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/er6\/detection-categories\">kateg\u00f3riou detekcie<\/a>, tak\u017ee nesta\u010d\u00ed len preuk\u00e1za\u0165, <em>\u017ee<\/em> k&nbsp;udalosti do\u0161lo. Najni\u017e\u0161ou kateg\u00f3riou detekcie je teraz kateg\u00f3ria V\u0161eobecn\u00e9, pod\u013ea ktorej mus\u00ed detekcia ukazova\u0165, \u017ee udalos\u0165 nastala <em>a<\/em> je nejak\u00fdm sp\u00f4sobom podozriv\u00e1 alebo \u0161kodliv\u00e1. Je d\u00f4le\u017eit\u00e9 zd\u00f4razni\u0165, \u017ee udalos\u0165 v&nbsp;sandboxe sa nepova\u017euje za&nbsp;udalos\u0165 v&nbsp;hodnotenom prostred\u00ed. Ako je uveden\u00e9 v&nbsp;opise, v\u0161eobecn\u00e1 detekcia mus\u00ed v&nbsp;s\u00favislosti s&nbsp;testovan\u00fdm prostred\u00edm poskytn\u00fa\u0165 odpovede na&nbsp;ot\u00e1zky \u010do, kde, kedy a&nbsp;kto. Tieto ot\u00e1zky nie je mo\u017en\u00e9 zodpoveda\u0165 na&nbsp;z\u00e1klade spustenia vzorky v&nbsp;externom sandboxe.<\/p>\n\n\n\n<p>Po&nbsp;druh\u00e9, niektor\u00e9 ne\u0161kodn\u00e9 \u010diastkov\u00e9 kroky sl\u00fa\u017eili sk\u00f4r na&nbsp;testovanie falo\u0161n\u00fdch poplachov ne\u017e detekci\u00ed. Je to v\u00edtan\u00e1 zmena, preto\u017ee dod\u00e1vate\u013eov bezpe\u010dnostn\u00fdch rie\u0161en\u00ed odr\u00e1dza od&nbsp;pr\u00edstupu riadiaceho sa heslom \u201edetegova\u0165 v\u0161etko\u201c, ktor\u00fd by mohol vies\u0165 k&nbsp;ve\u013ek\u00e9mu po\u010dtu hl\u00e1sen\u00ed a&nbsp;zbyto\u010dnej pr\u00e1ci bezpe\u010dnostn\u00fdch analytikov a&nbsp;navy\u0161e by zv\u00fd\u0161il n\u00e1klady na&nbsp;ukladanie \u00fadajov. \u010eal\u0161ou v\u00fdhodou tejto zmeny je, \u017ee umo\u017e\u0148uje vypo\u010d\u00edta\u0165 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Precision_and_recall\">sk\u00f3re presnosti<\/a>, ktor\u00e9 ud\u00e1va, ko\u013eko z&nbsp;detekci\u00ed zodpoved\u00e1 skuto\u010dne \u0161kodliv\u00fdm alebo podozriv\u00fdm \u010diastkov\u00fdm krokom.<\/p>\n\n\n\n<p>Po&nbsp;tretie, niektor\u00e9 \u010diastkov\u00e9 kroky s\u00fa s\u00edce zahrnut\u00e9 do&nbsp;testovania, ale nehodnotia sa. D\u00f4vodom zaradenia tak\u00fdchto \u010diastkov\u00fdch krokov je snaha lep\u0161ie simulova\u0165 re\u00e1lny kybernetick\u00fd \u00fatok t\u00fdm, \u017ee sa zabr\u00e1ni nelogick\u00fdm skokom v&nbsp;procese \u00fatoku.<\/p>\n\n\n\n<p>A&nbsp;nakoniec bola zaveden\u00e1 metrika objemu, ktor\u00e1 zaznamen\u00e1va po\u010det detekci\u00ed zobrazen\u00fdch na&nbsp;riadiacom paneli. Ide o&nbsp;\u010fal\u0161\u00ed sp\u00f4sob, ako odradi\u0165 dod\u00e1vate\u013eov bezpe\u010dnostn\u00fdch rie\u0161en\u00ed od&nbsp;toho, aby sa riadili heslom \u201edetegova\u0165 v\u0161etko\u201c a&nbsp;dovolili, aby ich riadiace panely zobrazovali <em>mili\u00f3ny<\/em> detekci\u00ed. Aj t\u00fato \u00fapravu v\u00edtame.<\/p>\n\n\n\n<p>Metrika objemu zaznamen\u00e1va aj z\u00e1va\u017enos\u0165 detekci\u00ed, pri\u010dom rozli\u0161uje p\u00e4\u0165 \u00farovn\u00ed: kritick\u00fa, vysok\u00fa, stredn\u00fa, n\u00edzku a&nbsp;informat\u00edvnu. Ke\u010f\u017ee ESET Inspect m\u00e1 tri <a href=\"https:\/\/help.eset.com\/ei_navigate\/2.2\/en-US\/rules.html?incidents.html\">\u00farovne z\u00e1va\u017enosti incidentu<\/a> (vysok\u00e1, stredn\u00e1 a&nbsp;n\u00edzka) a&nbsp;tri <a href=\"https:\/\/help.eset.com\/ei_navigate\/2.2\/en-US\/rules.html\">\u00farovne z\u00e1va\u017enosti detekcie<\/a> (hrozba, varovanie a&nbsp;inform\u00e1cia), dohodli sme sa s&nbsp;t\u00edmom MITRE Engenuity na&nbsp;mapovan\u00ed uvedenom v&nbsp;tabu\u013eke&nbsp;1.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color has-fixed-layout\"><tbody><tr><td><strong>ATT&amp;CK Evaluation<\/strong><\/td><td><strong>ESET Inspect<\/strong><\/td><\/tr><tr><td>Kritick\u00e1<\/td><td>Incident s&nbsp;vysokou z\u00e1va\u017enos\u0165ou<\/td><\/tr><tr><td>Vysok\u00e1<\/td><td>Detekcia na&nbsp;\u00farovni hrozby s\u00favisiaca s&nbsp;ak\u00fdmko\u013evek incidentom<\/td><\/tr><tr><td>Stredn\u00e1<\/td><td>Detekcia na&nbsp;\u00farovni varovania s\u00favisiaca s&nbsp;ak\u00fdmko\u013evek incidentom<\/td><\/tr><tr><td>N\u00edzka<\/td><td>Detekcia na&nbsp;\u00farovni inform\u00e1cie so&nbsp;sk\u00f3re &gt;&nbsp;22 s\u00favisiaca s&nbsp;ak\u00fdmko\u013evek incidentom<\/td><\/tr><tr><td>Informat\u00edvna<\/td><td>Detekcia na&nbsp;\u00farovni inform\u00e1cie so&nbsp;sk\u00f3re \u2264&nbsp;22 s\u00favisiaca s&nbsp;ak\u00fdmko\u013evek incidentom<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Tabu\u013eka\u00a01: Mapovanie medzi \u00farov\u0148ami z\u00e1va\u017enosti v\u00a0hodnoten\u00ed ATT&amp;CK Evaluation a\u00a0v\u00a0produkte ESET Inspect<\/em><\/p>\n\n\n\n<p>Je potrebn\u00e9 vysvetli\u0165, pre\u010do sme ako hranicu medzi n\u00edzkou a&nbsp;informat\u00edvnou \u00farov\u0148ou z\u00e1va\u017enosti zvolili sk\u00f3re&nbsp;22. V&nbsp;<a href=\"https:\/\/help.eset.com\/ei_navigate\/2.2\/en-US\/rules.html\">na\u0161ej dokument\u00e1cii<\/a> sa uv\u00e1dza:<\/p>\n\n\n\n<p>&#8222;<em>Pravidl\u00e1 so\u00a0sk\u00f3re z\u00e1va\u017enosti\u00a022 a\u00a0ni\u017e\u0161\u00edm s\u00fa telemetrick\u00e9 pravidl\u00e1. Zvy\u010dajne poskytuj\u00fa len dodato\u010dn\u00e9 inform\u00e1cie potrebn\u00e9 pri\u00a0vy\u0161etrovan\u00ed incidentu a\u00a0\u010dasto m\u00f4\u017eu by\u0165 aktivovan\u00e9 legit\u00edmnym spr\u00e1van\u00edm. Ak niektor\u00e9 z\u00a0t\u00fdchto pravidiel generuj\u00fa vo\u00a0va\u0161om prostred\u00ed pr\u00edli\u0161 ve\u013ek\u00fa aktivitu, m\u00f4\u017eete zv\u00e1\u017ei\u0165 ich vypnutie.<\/em>&#8222;<\/p>\n\n\n\n<p>\u010ealej v&nbsp;\u010dl\u00e1nku sa budeme odvol\u00e1va\u0165 len na&nbsp;\u00farovne z\u00e1va\u017enosti, ktor\u00e9 pou\u017e\u00edva ESET Inspect.<\/p>\n\n\n\n<p>V&nbsp;d\u00f4sledku tak\u00e9hoto mapovania nie s\u00fa detekcie, ktor\u00e9 nes\u00favisia s&nbsp;incidentom, zahrnut\u00e9 do&nbsp;hodnotenia. Do&nbsp;ve\u013ekej miery to odr\u00e1\u017ea zam\u00fd\u0161\u013ean\u00e9 vyu\u017eitie produktu ESET Inspect v&nbsp;re\u00e1lnom svete: pre bezpe\u010dnostn\u00fdch analytikov s\u00fa d\u00f4le\u017eit\u00e9 najm\u00e4 incidenty vygenerovan\u00e9 s\u00favisiacimi detekciami. \u010eal\u0161ie podrobn\u00e9 inform\u00e1cie a&nbsp;detekcie, ktor\u00e9 nes\u00favisia s&nbsp;incidentmi, no&nbsp;v&nbsp;niektor\u00fdch pr\u00edpadoch by mohli by\u0165 cenn\u00e9, s\u00fa sekund\u00e1rne.<\/p>\n\n\n\n<p>Ke\u010f\u017ee riadiace panely sa skladaj\u00fa z r\u00f4znych \u010dast\u00ed, ktor\u00e9 zobrazuj\u00fa detekcie a&nbsp;in\u00e9 inform\u00e1cie v&nbsp;podrobnej, s\u00fahrnnej alebo grafickej forme, dod\u00e1vatelia bezpe\u010dnostn\u00fdch rie\u0161en\u00ed mohli na&nbsp;\u00fa\u010dely hodnotenia \u0161pecifikova\u0165 \u0161tandardn\u00e9 zobrazenie, ktor\u00e9 maj\u00fa prev\u00e1dzkovatelia bezpe\u010dnostn\u00fdch syst\u00e9mov pou\u017e\u00edva\u0165 pri rie\u0161en\u00ed \u00fatokov. Pri posudzovan\u00ed udalost\u00ed ako detekci\u00ed alebo falo\u0161n\u00fdch poplachov, ako aj pri meran\u00ed ich objemu sa m\u00f4\u017eu zoh\u013ead\u0148ova\u0165 iba inform\u00e1cie prezentovan\u00e9 prostredn\u00edctvom tohto zobrazenia. V&nbsp;produkte ESET Inspect je \u0161tandardn\u00fdm zobrazen\u00edm pre bezpe\u010dnostn\u00fdch analytikov sekcia Incidenty.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Incidenty<\/h2>\n\n\n\n<p>Sekcia Incidenty predstavuje hlavn\u00e9 zobrazenie, ktor\u00e9 by mali prev\u00e1dzkovatelia bezpe\u010dnostn\u00fdch syst\u00e9mov pou\u017e\u00edva\u0165 pri&nbsp;pr\u00e1ci. Incidenty automaticky prib\u00fadaj\u00fa do&nbsp;sekcie dvoma sp\u00f4sobmi:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>pomocou n\u00e1stroja Incident Creator, ktor\u00fd vyu\u017e\u00edva jadro zalo\u017een\u00e9 na\u00a0umelej inteligencii na\u00a0sp\u00e1janie s\u00favisiacich detekci\u00ed do\u00a0jedn\u00e9ho incidentu,<\/li>\n\n\n\n<li>prostredn\u00edctvom\u00a0viac ako 100\u00a0pravidiel v\u00a0produkte ESET Inspect, ktor\u00e9 vytv\u00e1raj\u00fa incident v\u00a0reakcii na\u00a0svoju aktiv\u00e1ciu, agreguj\u00fa detekcie do\u00a0jedn\u00e9ho incidentu pod\u013ea zasiahnut\u00fdch po\u010d\u00edta\u010dov, \u010dasov\u00e9ho obdobia alebo oboch krit\u00e9ri\u00ed.<\/li>\n<\/ul>\n\n\n\n<p>Prev\u00e1dzkovate\u013eom bezpe\u010dnostn\u00fdch syst\u00e9mov sa odpor\u00fa\u010da postupova\u0165 takto:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Pre\u0161etri\u0165 ka\u017ed\u00fd incident.<\/li>\n\n\n\n<li>Pre\u0161etri\u0165 detekcie na\u00a0\u00farovni hrozby, ktor\u00e9 nes\u00favisia so\u00a0\u017eiadnym incidentom, ak to \u010das dovol\u00ed.<\/li>\n<\/ol>\n\n\n\n<p>Rovnako ako pri&nbsp;minuloro\u010dnom hodnoten\u00ed sa ka\u017ed\u00fd scen\u00e1r \u00fatoku uskuto\u010dnil dvakr\u00e1t. Pred druh\u00fdm kolom mali dod\u00e1vatelia bezpe\u010dnostn\u00fdch rie\u0161en\u00ed mo\u017enos\u0165 vykona\u0165 zmeny v&nbsp;konfigur\u00e1cii, aby sa pok\u00fasili zv\u00fd\u0161i\u0165 preh\u013ead, zn\u00ed\u017ei\u0165 po\u010det falo\u0161n\u00fdch poplachov a&nbsp;objem detekci\u00ed. Na&nbsp;obr\u00e1zku&nbsp;1 je zobrazen\u00e1 sekcia Incidenty po&nbsp;zmene konfigur\u00e1cie.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"971\" height=\"482\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image.png\" alt=\"\" class=\"wp-image-6129\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image.png 971w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-300x149.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-768x381.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-370x184.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-760x377.png 760w\" sizes=\"auto, (max-width: 971px) 100vw, 971px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok\u00a01: Sekcia Incidenty v\u00a0produkte ESET Inspect po\u00a0zmene konfigur\u00e1cie<\/em><\/p>\n\n\n\n<p>Incident Creator (Spr\u00e1vca incidentov) po\u010das hodnotenia nevygeneroval \u017eiadne falo\u0161n\u00e9 poplachy. Naopak, po\u00a0zmene konfigur\u00e1cie bol vygenerovan\u00fd len jeden alebo dva incidenty a\u00a0takmer v\u0161etky relevantn\u00e9 detekcie dostupn\u00e9 v\u00a0produkte ESET Inspect boli prepojen\u00e9 s\u00a0nejak\u00fdm incidentom.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">D\u00f4le\u017eit\u00e9 momenty v jednotliv\u00fdch scen\u00e1roch<\/h2>\n\n\n\n<p>\u010ealej v\u00a0\u010dl\u00e1nku sa pozrieme na\u00a0najd\u00f4le\u017eitej\u0161ie v\u00fdsledky, ktor\u00e9 sa spolo\u010dnosti ESET podarilo dosiahnu\u0165 v\u00a0jednotliv\u00fdch scen\u00e1roch.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">K\u013dDR<\/h3>\n\n\n\n<p>ESET Inspect automaticky vyhodnotil \u00fatok v\u00a0r\u00e1mci scen\u00e1ra \u201eK\u013dDR\u201c ako incident strednej z\u00e1va\u017enosti vytvoren\u00fd n\u00e1strojom Incident Creator (Spr\u00e1vca incidentov). Medzi najd\u00f4le\u017eitej\u0161ie v\u00fdsledky, ktor\u00e9 spolo\u010dnos\u0165 ESET v\u00a0tomto scen\u00e1ri dosiahla, patr\u00ed detekcia dvoch backdoorov nain\u0161talovan\u00fdch na\u00a0podozriv\u00fdch miestach a\u00a0backdoorov\u00fdch procesov maskovan\u00fdch ako Docker a\u00a0Zoom, detekcia kr\u00e1de\u017ee \u00fadajov zo\u00a0s\u00faborov n\u00e1stroja <a href=\"https:\/\/en.wikipedia.org\/wiki\/Keychain_(software)\">Keychain<\/a> a\u00a0\u017eiadne falo\u0161n\u00e9 poplachy.<\/p>\n\n\n\n<p>Na&nbsp;obr\u00e1zku&nbsp;2 s\u00fa zobrazen\u00e9 niektor\u00e9 detekcie incidentu s\u00favisiace s&nbsp;t\u00fdmto \u00fatokom, pri\u010dom je zv\u00fdraznen\u00e1 detekcia <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/osx.fullhouse\">backdooru FULLHOUSE.DOORED<\/a>, ktor\u00fd in\u0161taluje perzistenciu pre druhostup\u0148ov\u00fd backdoor <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.stratofear\">STRATOFEAR<\/a> vo&nbsp;forme <a href=\"https:\/\/developer.apple.com\/library\/archive\/documentation\/MacOSX\/Conceptual\/BPSystemStartup\/Chapters\/CreatingLaunchdJobs.html\">spustite\u013en\u00e9ho daemonu<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"971\" height=\"482\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-1.png\" alt=\"\" class=\"wp-image-6130\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-1.png 971w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-1-300x149.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-1-768x381.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-1-370x184.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-1-760x377.png 760w\" sizes=\"auto, (max-width: 971px) 100vw, 971px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok\u00a02: S\u00favisiace detekcie z\u00a0incidentu vygenerovan\u00e9ho Spr\u00e1vcom incidentov v\u00a0r\u00e1mci scen\u00e1ra \u201eK\u013dDR\u201c<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cl0p<\/h3>\n\n\n\n<p>Po\u00a0zmene konfigur\u00e1cie ESET Inspect automaticky vyhodnotil \u00fatok v\u00a0r\u00e1mci scen\u00e1ra \u201eCl0p\u201c ako dva incidenty s\u00a0vysokou z\u00e1va\u017enos\u0165ou, pri\u010dom jeden bol vytvoren\u00fd n\u00e1strojom Incident Creator (Spr\u00e1vca incidentov) a\u00a0druh\u00fd pravidlom, ktor\u00e9 monitoruje detekciu filecoderov na\u00a0koncov\u00fdch zariadeniach.<\/p>\n\n\n\n<p>Medzi najd\u00f4le\u017eitej\u0161ie v\u00fdsledky, ktor\u00e9 spolo\u010dnos\u0165 ESET v&nbsp;tomto scen\u00e1ri dosiahla, patr\u00ed detekcia na\u010d\u00edtania in\u0161tala\u010dn\u00e9ho programu <a href=\"https:\/\/attack.mitre.org\/software\/S0461\/\">SDBbot<\/a> a&nbsp;DLL kni\u017en\u00edc zav\u00e1dza\u010da, odhalenie modifik\u00e1cie k\u013e\u00fa\u010da datab\u00e1zy Registry na&nbsp;dosiahnutie perzistencie pre&nbsp;SDBbot RAT, detekcia vymazania <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shadow_Copy\">tie\u0148ov\u00fdch k\u00f3pi\u00ed<\/a>, zak\u00e1zania obnovy syst\u00e9mu Windows po&nbsp;zlyhan\u00ed \u0161tartu a&nbsp;spustenia ransomv\u00e9ru Cl0p.<\/p>\n\n\n\n<p>Na&nbsp;obr\u00e1zku&nbsp;3 s\u00fa zobrazen\u00e9 niektor\u00e9 detekcie incidentu s\u00favisiace s&nbsp;t\u00fdmto \u00fatokom, pri\u010dom je zv\u00fdraznen\u00e1 detekcia z\u00e1pisu alebo premenovania <a href=\"https:\/\/help.eset.com\/glossary\/sk-SK\/canary_file.html\">nastra\u017een\u00fdch s\u00faborov<\/a> sl\u00fa\u017eiacich na&nbsp;v\u010dasn\u00fa detekciu spustenia ransomv\u00e9ru. Aktivovan\u00e9 pravidlo nielen\u017ee ukon\u010d\u00ed problematick\u00fd proces, ale tie\u017e vytvor\u00ed incident v&nbsp;sekcii Incidenty.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"971\" height=\"482\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-2.png\" alt=\"\" class=\"wp-image-6131\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-2.png 971w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-2-300x149.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-2-768x381.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-2-370x184.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-2-760x377.png 760w\" sizes=\"auto, (max-width: 971px) 100vw, 971px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok\u00a03: S\u00favisiace detekcie z\u00a0incidentu vygenerovan\u00e9ho Spr\u00e1vcom incidentov v\u00a0r\u00e1mci scen\u00e1ra \u201eCl0p\u201c<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">LockBit<\/h3>\n\n\n\n<p>Po&nbsp;zmene konfigur\u00e1cie ESET Inspect automaticky vyhodnotil \u00fatok v&nbsp;r\u00e1mci scen\u00e1ra \u201eLockBit\u201c ako dva incidenty s&nbsp;vysokou z\u00e1va\u017enos\u0165ou, pri\u010dom jeden bol vytvoren\u00fd Spr\u00e1vcom incidentov a&nbsp;druh\u00fd pravidlom, ktor\u00e9 monitoruje detekciu spyv\u00e9ru na&nbsp;koncov\u00fdch zariadeniach.<\/p>\n\n\n\n<p>Medzi najd\u00f4le\u017eitej\u0161ie v\u00fdsledky, ktor\u00e9 spolo\u010dnos\u0165 ESET v&nbsp;tomto scen\u00e1ri dosiahla, patr\u00ed detekcia prihl\u00e1senia \u00fato\u010dn\u00edka cez <a href=\"https:\/\/en.wikipedia.org\/wiki\/VNC\">VNC<\/a>, odhalenie modifik\u00e1cie hodnoty datab\u00e1zy Registry na&nbsp;umo\u017enenie automatick\u00e9ho prihl\u00e1senia, detekcia pou\u017eitia SSH na&nbsp;pripojenie k&nbsp;linuxov\u00e9mu serveru v&nbsp;internej sieti, odhalenie \u0161\u00edrenia ransomv\u00e9ru LockBit na&nbsp;\u010fal\u0161ie po\u010d\u00edta\u010de v&nbsp;sieti cez <a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/psexec\">PsExec<\/a>, detekcia spustenia ransomv\u00e9ru LockBit a&nbsp;vymazania protokolov udalost\u00ed syst\u00e9mu Windows s&nbsp;cie\u013eom skry\u0165 aktivitu infiltr\u00e1cie.<\/p>\n\n\n\n<p>Na&nbsp;obr\u00e1zku&nbsp;4 s\u00fa zobrazen\u00e9 niektor\u00e9 detekcie incidentu s\u00favisiace s&nbsp;t\u00fdmto \u00fatokom, pri\u010dom je zv\u00fdraznen\u00e1 detekcia podozriv\u00e9ho procesu, ktor\u00fd zapisuje alebo premenov\u00e1va s\u00fabory so&nbsp;\u0161pecifick\u00fdmi, tzv. dvojit\u00fdmi pr\u00edponami (typick\u00e9 spr\u00e1vanie filecoderu).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"971\" height=\"482\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-3.png\" alt=\"\" class=\"wp-image-6132\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-3.png 971w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-3-300x149.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-3-768x381.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-3-370x184.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/image-3-760x377.png 760w\" sizes=\"auto, (max-width: 971px) 100vw, 971px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Obr\u00e1zok\u00a04: S\u00favisiace detekcie z\u00a0incidentu vygenerovan\u00e9ho Spr\u00e1vcom incidentov v\u00a0r\u00e1mci scen\u00e1ra \u201eLockBit\u201c<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zop\u00e1r slov na z\u00e1ver<\/h2>\n\n\n\n<p>Ver\u00edme, \u017ee vy\u0161\u0161ie uveden\u00e9 zhrnutie najlep\u0161ie vystihuje n\u00e1\u0161 pr\u00edstup pri&nbsp;navrhovan\u00ed produktu ESET Inspect. Bezpe\u010dnostn\u00ed analytici si m\u00f4\u017eu by\u0165 maxim\u00e1lne ist\u00ed, \u017ee ke\u010f ich ESET Inspect upozorn\u00ed na&nbsp;incident so&nbsp;s\u00favisiacimi detekciami, v\u017edy ide o skuto\u010dn\u00e9 hrozby, ktor\u00e9 m\u00f4\u017eu efekt\u00edvne rie\u0161i\u0165.<\/p>\n\n\n\n<p>Op\u00e4\u0165 by sme chceli zd\u00f4razni\u0165, \u017ee t\u00edm MITRE profesion\u00e1lne vykonal \u010fal\u0161ie kolo hodnotenia a&nbsp;priniesol nieko\u013eko zmien, ktor\u00e9 maj\u00fa dod\u00e1vate\u013eov bezpe\u010dnostn\u00fdch rie\u0161en\u00ed podnieti\u0165 k&nbsp;tomu, aby sa viac zameriavali na&nbsp;rozmanitos\u0165 takt\u00edk a&nbsp;techn\u00edk, ktor\u00e9 \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa v&nbsp;re\u00e1lnom svete, a&nbsp;nie na&nbsp;to, aby boli \u201ev\u00ed\u0165azmi\u201c neexistuj\u00facej s\u00fa\u0165a\u017ee.<\/p>\n\n\n\n<p>Pokia\u013e ide o&nbsp;n\u00e1s, hoci sa sna\u017e\u00edme zlep\u0161i\u0165 niektor\u00e9 aspekty produktu ESET Inspect a&nbsp;odhali\u0165 tak \u010fal\u0161ie spr\u00e1vne detekcie, je potrebn\u00e9 zv\u00e1\u017ei\u0165 riziko, \u017ee v\u00fdrazn\u00e9 roz\u0161\u00edrenie detek\u010dn\u00fdch schopnost\u00ed by mohlo zn\u00ed\u017ei\u0165 presnos\u0165 n\u00e1stroja a&nbsp;zv\u00fd\u0161i\u0165 objem hl\u00e1sen\u00ed, \u010do by ochromilo na\u0161u strat\u00e9giu a&nbsp;prin\u00e1\u0161alo by \u010doraz men\u0161iu hodnotu za&nbsp;st\u00e1le vy\u0161\u0161ie n\u00e1klady.<\/p>\n\n\n\n<p>Ver\u00edme, \u017ee poh\u013ead spolo\u010dnosti ESET na\u00a0tohtoro\u010dn\u00e9 hodnotenie podnietil va\u0161u zvedavos\u0165 a\u00a0detailnej\u0161ie si pozriete na\u0161e v\u00fdsledky na\u00a0str\u00e1nke hodnotenia MITRE ATT&amp;CK Evaluations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>N\u00e1stroj Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu zaznamenal po\u010das hodnotenia v\u00fdznamn\u00fd pr\u00ednos v\u00a0spr\u00e1ve incidentov. N\u00e1zory a\u00a0stanovisk\u00e1 vyjadren\u00e9 v\u00a0tomto blogovom pr\u00edspevku s\u00fa n\u00e1zormi a\u00a0stanoviskami spolo\u010dnosti ESET a\u00a0nemusia nevyhnutne odr\u00e1\u017ea\u0165 n\u00e1zory alebo postoje organiz\u00e1cie MITRE Engenuity. V&nbsp;tohtoro\u010dnom hodnoten\u00ed ATT&amp;CK\u00ae Evaluations zameranom na&nbsp;segment ve\u013ek\u00fdch firiem vytvorila organiz\u00e1cia MITRE tri scen\u00e1re \u00fatoku: scen\u00e1r \u201eK\u00f3rejsk\u00e1 \u013eudovodemokratick\u00e1 republika (K\u013dDR)\u201c na&nbsp;testovanie kybernetickej \u0161pion\u00e1\u017ee v&nbsp;syst\u00e9me macOS,&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-6127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hodnotenie ATT&amp;CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI | ESET<\/title>\n<meta name=\"description\" content=\"N\u00e1stroj Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu zaznamenal po\u010das hodnotenia v\u00fdznamn\u00fd pr\u00ednos v\u00a0spr\u00e1ve incidentov.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hodnotenie ATT&amp;CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI | ESET\" \/>\n<meta property=\"og:description\" content=\"N\u00e1stroj Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu zaznamenal po\u010das hodnotenia v\u00fdznamn\u00fd pr\u00ednos v\u00a0spr\u00e1ve incidentov.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-13T10:48:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Hodnotenie ATT&amp;CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI\",\"datePublished\":\"2025-01-13T10:48:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/\"},\"wordCount\":2280,\"publisher\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/\",\"name\":\"Hodnotenie ATT&CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI | ESET\",\"isPartOf\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png\",\"datePublished\":\"2025-01-13T10:48:13+00:00\",\"description\":\"N\u00e1stroj Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu zaznamenal po\u010das hodnotenia v\u00fdznamn\u00fd pr\u00ednos v\u00a0spr\u00e1ve incidentov.\",\"breadcrumb\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#primaryimage\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png\",\"contentUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png\",\"width\":1200,\"height\":628,\"caption\":\"BVF Mitre 2024 ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hodnotenie ATT&amp;CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#website\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hodnotenie ATT&CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI | ESET","description":"N\u00e1stroj Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu zaznamenal po\u010das hodnotenia v\u00fdznamn\u00fd pr\u00ednos v\u00a0spr\u00e1ve incidentov.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/","og_locale":"sk_SK","og_type":"article","og_title":"Hodnotenie ATT&CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI | ESET","og_description":"N\u00e1stroj Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu zaznamenal po\u010das hodnotenia v\u00fdznamn\u00fd pr\u00ednos v\u00a0spr\u00e1ve incidentov.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2025-01-13T10:48:13+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png","type":"image\/png"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"10 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Hodnotenie ATT&amp;CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI","datePublished":"2025-01-13T10:48:13+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/"},"wordCount":2280,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/","name":"Hodnotenie ATT&CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png","datePublished":"2025-01-13T10:48:13+00:00","description":"N\u00e1stroj Incident Creator (Spr\u00e1vca incidentov) v\u00a0produkte ESET Inspect vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu zaznamenal po\u010das hodnotenia v\u00fdznamn\u00fd pr\u00ednos v\u00a0spr\u00e1ve incidentov.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/01\/MITRE-corp-blog_SK_1200x628-no-text-1.png","width":1200,"height":628,"caption":"BVF Mitre 2024 ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/hodnotenie-attck-evaluations-zamerane-na-segment-velkych-firiem-vyzdvihuje-pristup-eset-u-k-detekcii-a-reakcii-na-incidenty-vyuzivajuci-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Hodnotenie ATT&amp;CK\u00ae Evaluations zameran\u00e9 na\u00a0segment ve\u013ek\u00fdch firiem vyzdvihuje pr\u00edstup ESET-u k\u00a0detekcii a\u00a0reakcii na\u00a0incidenty vyu\u017e\u00edvaj\u00faci AI"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6127"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6127\/revisions"}],"predecessor-version":[{"id":6134,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6127\/revisions\/6134"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6133"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}