Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity professionals to access increasingly larger amounts of heterogeneous data. Among those, cyber attacks’ Tactics, Techniques and Procedures (TTPs) have proven to be particularly valuable to characterize threat actors’ behaviors and, thus, improve defensive countermeasures. Unfortunately, this information is often hidden within human-readable textual reports and must be extracted manually. In this paper, we evaluate several classification approaches to automatically retrieve TTPs from unstructured text. To implement these approaches, we take advantage of the MITRE ATT&CK framework, an open knowledge base of adversarial tactics and techniques, to train cl...
During the past decade, mobile attacks have been established as an indispensable attack vector adopt...
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework provides a rich a...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity professio...
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without understanding the m...
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without understanding the m...
Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a globa...
With the increased sophistication of tools and techniques deployed by cybercriminals, traditional me...
Cyber attacks are becoming more sophisticated and diverse, making detection increasingly challenging...
Cyber Security has been a big concern especially in past one decade where it is witnessed that targe...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
Color poster with text, charts, and graphs.As cyber-attacks increase in volume and sophistication, t...
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security co...
In this paper we propose an approach for hunting adversarial tactics technics and procedures (TTPs)...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
During the past decade, mobile attacks have been established as an indispensable attack vector adopt...
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework provides a rich a...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity professio...
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without understanding the m...
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without understanding the m...
Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a globa...
With the increased sophistication of tools and techniques deployed by cybercriminals, traditional me...
Cyber attacks are becoming more sophisticated and diverse, making detection increasingly challenging...
Cyber Security has been a big concern especially in past one decade where it is witnessed that targe...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
Color poster with text, charts, and graphs.As cyber-attacks increase in volume and sophistication, t...
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security co...
In this paper we propose an approach for hunting adversarial tactics technics and procedures (TTPs)...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
During the past decade, mobile attacks have been established as an indispensable attack vector adopt...
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework provides a rich a...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...