InMITRE ATT&CK®byAmy L. RobertsonATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured DetectionsATT&CK has been brewing up something eerie for this Halloween — ATT&CK v14Oct 31, 20232
InMITRE ATT&CK®byBlake StromGetting Started with MITRE ATT&CK: Adversary Emulation and Red TeamingGetting Started with ATT&CK from an adversary emulation perspectiveJul 17, 2019
InMITRE ATT&CK®byAmy L. RobertsonATT&CK v13 Enters the RoomPseudocode, Swifter Search, and Mobile Data SourcesApr 25, 2023Apr 25, 2023
InMITRE ATT&CK®byJose Luis RodriguezDefining ATT&CK Data Sources, Part I: Enhancing the Current StateOutlining a new methodology to extend the concepts around data sourcesSep 10, 20205Sep 10, 20205
InLevel Up CodingbyNinjaCoderEffective Threat Modelling with the Mitre Att&ck Framework — Boost Your SecurityThreat Modelling with the Mitre Att&ck FrameworkApr 3, 2023Apr 3, 2023
InMITRE ATT&CK®byAmy L. RobertsonATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured DetectionsATT&CK has been brewing up something eerie for this Halloween — ATT&CK v14Oct 31, 20232
InMITRE ATT&CK®byBlake StromGetting Started with MITRE ATT&CK: Adversary Emulation and Red TeamingGetting Started with ATT&CK from an adversary emulation perspectiveJul 17, 2019
InMITRE ATT&CK®byAmy L. RobertsonATT&CK v13 Enters the RoomPseudocode, Swifter Search, and Mobile Data SourcesApr 25, 2023
InMITRE ATT&CK®byJose Luis RodriguezDefining ATT&CK Data Sources, Part I: Enhancing the Current StateOutlining a new methodology to extend the concepts around data sourcesSep 10, 20205
InLevel Up CodingbyNinjaCoderEffective Threat Modelling with the Mitre Att&ck Framework — Boost Your SecurityThreat Modelling with the Mitre Att&ck FrameworkApr 3, 2023
InMITRE ATT&CK®byAndy ApplebaumGetting Started with ATT&CK: Assessments and EngineeringGetting Started with ATT&CK from an assessment and engineering perspectiveAug 1, 2019
InCenter for Threat-Informed DefensebyIngrid SkoogAttack Flow — Make Threat-Informed Decisions Based on Steps in a Cyber-AttackWritten by Ross Weisman, Mark E. Haase, and Ingrid SkoogOct 27, 2022
InMITRE ATT&CK®bySelena LarsonIntelligence Failures of Lincoln’s Top Spies: What CTI Analysts Can Learn From the Civil WarBy examining the intelligence reporting failures documented by modern historians, threat intelligence analysts can be better preparedMar 29, 20221