TOP 10

Techniques

The following chart illustrates the ranking of MITRE ATT&CK techniques associated with confirmed threats across our customers’ environments. We counted techniques by total threat volume, and the percentages below are a measure of each technique’s share of overall detection volume. Since multiple techniques can be mapped to any confirmed threat, the percentages below add up to more than 100 percent. Clicking on any of these techniques will either take you to an analysis or a landing page containing one or more sub-techniques to choose from.