Intelligence Failures of Lincoln’s Top Spies: What CTI Analysts Can Learn From the Civil War

Selena Larson Mar 29 ·9 min read Guest Post by ATT&CKcon 3.0 Keynote Speaker, Selena Larson Allan Pinkerton (Alexander Gardner — Library of Congress) At the onset of the Civil…

Okta breach leads to questions on disclosure, reliance on third-party vendors

Written by Suzanne Smalley Mar 24, 2022 | CYBERSCOOP Criticism of the identity authentication company Okta intensified Thursday in the wake of the company’s announcement that 366 customer accounts were…

Behavior-based vs IOC-based Threat Detection Approaches: How to Prioritize?

A core cybersecurity procedure usually includes running detection rules based on the Indicators of Compromise (IOCs). However, the latest trend is focused on the behavior-based detection approach. Let’s find out…

Key Features Of Threat Intelligence Platforms

Threat intelligence platforms (TIP) keep the company updated about new potential threats and attacks. Let’s dig deeper into what else TIPs offer. In recent times, incidents related to cybersecurity threats…

A Guide to Doing Cyberintelligence on a Restricted Budget

Cybersecurity budget cuts are everywhere. Chad Anderson, senior security researcher at DomainTools, discusses alternatives to fancy tooling, and good human skills alignment. For those in the industry, it comes as…

Identifying UNC2452-Related Techniques for ATT&CK

Matt MaloneDec 22, 2020 · 4 min read By Matt Malone (MITRE), Jamie Williams (MITRE), Jen Burns (MITRE), and Adam Pennington (MITRE) Last updated 19 April 2021 12:00pm EDT Reporting…

Bringing PRE into Enterprise

Adam PenningtonOct 27, 2020 · 6 min read Written by Adam Pennington and Jen Burns We’re excited to announce that we’ve released the latest version of MITRE ATT&CK (v8), which…