Last year we created a map of MITRE #ATT&CK objects to really help us understand how they were connected, beyond just Tactics and Techniques.
It continues to help us immensely when categorising #threatintel.
Hopefully you'll find it useful too.
miro.com/app/board/uX...
Posts by dogesec
Take a #mitreattack technique. Find out what #vulnerabilities that technique is used to exploit.
And a whole lot more...
youtu.be/J_LbAzoUpd4
#threatintel peeps: understanding how #ransomware operators are performing financially can give a good indication of where to focus your research and defensive activities.
www.dogesec.com/blog/stix_gr...
We've just added @doublepulsar.com to our list of Awesome #threatintel Blogs...
github.com/muchdogesec/...
We wanted a #TAXII Server to distribute our #threatintel into #MISP servers.
We didn't want a full blown TIP platform, nor did we want to write custom connectors to our graph database.
So we built Arango TAXII Server.
www.youtube.com/watch?v=tYWO...
For those the prefer a video:
www.youtube.com/watch?v=CcoA...
All of our #threatintel is stored on a single network graph. You can traverse it easily to further enrich your research.
In this post we lift the lid on one small part of that graph... how we link popular knowledge-bases like MITRE's #attack an #cwe.
www.dogesec.com/blog/how_cti...
MITRE #ATT&CK ATT&CKcon 5.0 recordings now on YT
www.youtube.com/playlist?lis...
tl;dr ATLAS = ATT&CK for AI.
MITRE ATLAS is a knowledge base of adversary tactics, techniques, and case studies for AI systems.
CTI Butler now supports the latest version MITRE ATLAS (v4.7.0) ๐
The framework is already indispensable for our team when classifying #threatintelligence research.
github.com/muchdogesec/...
@nasbench.bsky.social ๐
Compared to release v2023-08-24, in v2024-11-10 there are 469 more public #detectionrules in the #SigmaRules repository.
www.dogesec.com/blog/analysi...
#threatintelligence #threatintel