The latest round of evaluations is called ‘Enterprise 4’ evaluations. Through the lens of the MITRE ATT&CK ®knowledge base, MITRE Engenuity focused on two threat actors, Wizard Spider and Sandworm, for this Enterprise 4 Evaluation. These two threat actors were chosen based...
ESET continues to be one of the most referenced and active contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.
Throughout the MITRE Engenuity ATT&CKEnterpriseEvaluation, the Falcon platform leveraged its native automation capabilities. Typically, when a file-based attack is blocked on the endpoint by CrowdStrike Falcon®Prevent next-generation antivirus, it is automatically sent to Falcon Intelligence...
A PowerShell script to interact with the MITRE ATT&CK Framework via its own API - Cyb3rWard0g/Invoke-ATTACKAPI
Atomic Red Team](https://github.com/redcanaryco/atomic-red-team) - Small and highly portable detection tests mapped to the Mitre ATT&CK Framework. AutoTTP - Automated Tactics Techniques & Procedures. Re-running complex sequences manually for regression tests, product evaluations, generate data fo...