PinnedJon BakerinMITRE-EngenuityCall for Participation: Sightings EcosystemWe are seeking data contributors willing to contribute observations of adversary activity mapped to ATT&CK, called “sightings”.Oct 20, 20223Oct 20, 20223
Jon BakerinMITRE-EngenuityIndustry Leaders Expand Threat-Informed Defense to AI-Enabled SystemsWritten by Suneel Sundar.Jul 16Jul 16
Jon BakerinMITRE-EngenuitySoftware Security: Now Threat-Informed!Written by Mark E. Haase.Jun 211Jun 211
Jon BakerinMITRE-Engenuity2023 Impact Report: Advancing Threat-Informed Defense GloballyThis year’s report showcases more than two dozen freely available projects for your team and your organization to adopt and use as your own.Feb 12Feb 12
Jon BakerinMITRE-EngenuityA Deep Dive into the OceanLotus Adversary Emulation for macOS & LinuxWritten by L. Piper and Cat Self.Oct 12, 2023Oct 12, 2023
Jon BakerinMITRE-EngenuityDropping Lotus Bombs: Adversary Emulation for macOS & LinuxWritten by L. Piper and Cat Self.Oct 11, 20231Oct 11, 20231
Jon BakerinMITRE-EngenuitySummiting the Pyramid: Level Up Your AnalyticsWritten by Roman Daszczyszak, Steve Luke, and Ross Weisman.Sep 13, 2023Sep 13, 2023
Jon BakerinMITRE-EngenuityOur TRAM Large Language Model Automates TTP Identification in CTI ReportsWritten by James Ross & jackie lasky.Aug 29, 2023Aug 29, 2023
Jon BakerinMITRE-EngenuityATT&CK Workbench 2.0: Your Bench, Your Team, Your Most Relevant TTPsWritten by Mike Cunningham & Charissa Miller.Aug 15, 2023Aug 15, 2023
Jon BakerinMITRE-EngenuityElevate your threat intel reports with CTI BlueprintsWritten by Patrick O’Neill, Mia Sanchez, and Ross Rustici.Jun 13, 20231Jun 13, 20231