Articles tagged with: #mitre-attack Clear filter
KillChainGraph: ML Framework for Predicting and Mapping ATT&CK Techniques

KillChainGraph: ML Framework for Predicting and Mapping ATT&CK Techniques

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.18230v1 Announce Type: new Abstract: The escalating complexity and volume of cyberattacks demand proactive detection strategies that go beyond traditional rule-based systems. This paper presents a phase-aware, multi-model machine learning framework that emulates adversarial behavior across the seven phases of the Cyber Kill Chain using the MITRE ATT&CK Enterprise dataset. Techniques are semantically mapped to phases via ATTACK-BERT, producing seven phase-specific datasets. We...

Catching Haitian Gangsters

Catching Haitian Gangsters

Blackhat Library: Hacking techniques and research www.reddit.com

If I wanted to pinpoint the location of several gangsters in Haiti most populous city of Port-Au-Prince, what would this cyber campaign look like. I want details to be as close as possible such as a detailed ATT&CK framework, cyber kill chain, etc. I'm just a script kiddie and I obviously can't ask chatgippity. submitted by /u/SaintNoirism [link] [comments]

Mapping MDE detections to ATT&CK  -  how do you guys do it?

Mapping MDE detections to ATT&CK - how do you guys do it?

cybersecurity www.reddit.com

I've been working on mapping my SIEM rules to MITRE ATT&CK so I can understand what I'm really detecting. That part's fine, but then it hit me - products like MDE already have a ton of built-in detections out of the box. Now I'm wondering: how do you actually map those MDE detections to ATT&CK? is there some list/export of all alerts/detections available in MDE? I just wanna get a real picture of coverage across my environment, not only what's in the SIEM but also what's being flagged...

What product data points would you like to see in this tool?

What product data points would you like to see in this tool?

cybersecurity www.reddit.com

As we get ready to launch the completely re-vamped HarvestIQ.ai we need your help. Here are the data points we currently track for all 11,340 cybersecurity products. What other data would be valuable? -Product name -Description -Features-Usage -Deployment -Integrations -Price (when discoverable) -Alignment with NIST CSF 2.0, MITRE ATT&CK, and CIS submitted by /u/CarnivalCarnivore [link] [comments]