Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Silobreaker integrates MITRE ATT&CK TTP detections into its threat intelligence platform

March 2024 by Marc Jacob

Security and threat intelligence technology company, Silobreaker announced a powerful integration with MITRE ATT&CK Matrix for Enterprise, Industrial Control Systems (ICS) and Mobile, to help organisations better understand threats associated with malware, threat actors and industries. This latest enhancement enables organisations using the Silobreaker platform to leverage the MITRE ATT&CK Matrix – a global database of tactics, techniques, and procedures (TTPs) based on real-world observations – to categorise, assess and respond to threats to their operations.

Cyber threat intelligence analysts often struggle to transform raw information and reporting into actionable intelligence that’s relevant to their organisations. Silobreaker’s latest integration enables them to zero in on references to TTPs labelled with ATT&CK identifiers across open and premium intelligence sources, filtering by source, unusual activity, volume and timespan. They can then seamlessly populate a dynamic, up-to-date ATT&CK Matrix for Enterprise, ICS or Mobile domains, based on their findings.

Key features and benefits:
Organisations can discover TTPs from Silobreaker’s unparalleled collection of critical threat intelligence sources, including open-source blogs, government agencies, threat research and social media, as well as premium vendors such as Mandiant, Flashpoint and Intel 471 – all presented in the ATT&CK Matrix view. With this breadth of coverage into threat actors and malware, threat intelligence teams can be confident that they have access to the latest and highest-quality information on TTPs, all in one place.
ATT&CK identifiers are now natively integrated into Silobreaker’s powerful entity extraction and querying capabilities, enabling analysts to use tactic or technique identifiers to search for and detect threat actors, malware or industries of interest related to certain TTPs. Intelligence teams are also able to efficiently disseminate intelligence on TTPs to key stakeholders within their organisations, through custom intelligence reports and via the Silobreaker intelligence workspace.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts