MITRE ATT&CK

MITRE ATT&CK™ offers the security community a common language to communicate about adversary tactics, techniques, and behaviors. In the articles and resources below, we offer guidance on how security teams can use the framework to expand detection coverage and increase visibility.

 

Worms shape the narrative in Red Canary’s 2020 Threat Detection Report

 

Researchers, Assemble! Why Red Canary is a Founding Sponsor of MITRE’s Center for Threat-Informed Defense

 

ATT&CK T1501: Understanding systemd service persistence

 

Debriefing ATT&CKcon 2.0: Five great talks at MITRE’s ATT&CK conference

 

Four tools to consider if you’re adopting ATT&CK

 

ATT&CK™ Is Only as Good as Its Implementation: Avoiding Five Common Pitfalls

 

Using MITRE ATT&CK™ When Researching Attacker Behavior and Running Unit Tests

 

Q & A: How to Use the MITRE ATT&CK™ Framework to Mature Your Threat Hunting Program

Integrating MITRE ATT&CK™ into Red Canary detections