Blog Posts

Center for Threat-Informed Defense

Context to Confidence: The Next Phase of Ambiguous Techniques Research

By Mike Cunningham, Antonia Feffer

February 19, 2026

MITRE CTID’s latest ambiguous techniques research turns context into confidence with minimum telemetry requirements and a confidence scoring model that helps detection engineers pick the right log sources for robust, low-noise detections.

Continue reading

A Threat-Informed Community is Necessary for Defense to Function

By Suneel Sundar

February 12, 2026

Threat-informed defense changes the game on the adversary. Threat-informed defenders read their adversaries’ playbooks and then orchestrate a defense based on that knowledge. MITRE ATT&CK® is the core of threat-informed defense as our framework of adversary tactics, techniques, and procedures …

Continue reading

MITRE ATLAS OpenClaw Investigation Discovers New and Likeliest Techniques

By Suneel Sundar

February 9, 2026

MITRE ATLAS™ analyzed OpenClaw incidents that showcase how AI-first ecosystems introduce new exploit execution paths. OpenClaw is unique because it can independently make decisions, take actions, and complete tasks without continuous human oversight. By mapping the patterns and behaviors to ATLAS …

Continue reading

Cloud Security Built with ATT&CK

By Tiffany Bergeron, Daniel Bah

January 28, 2026

Threats to cloud computing span multiple security domains, objectives, and layers of technology. Defenders must protect dynamic, shared environments while adversaries actively exploit misconfigurations, weak controls, and gaps between responsibility boundaries. To keep up, security cannot just focus …

Continue reading

From Insight to Impact: INFORM your Defense

By Mike Cunningham, Val Valenzuela

January 8, 2026

INFORM builds on M3TID to translate threat intelligence, defensive measures, and test & evaluation into a measurable, repeatable practice. Here’s how to use the new assessment to mature your threat-informed defense program.

Continue reading

Get in Sync with ATT&CK and CTID

By Tiffany Bergeron, Allison Robbins

November 15, 2025

Threat-informed defenders can use ATT&CK Sync and the enhanced Mappings Editor to keep ATT&CK-based tools and mappings current with major changes like ATT&CK v18.

Continue reading

Can You Detect What You Can’t Predict? Lessons from SharePoint Vulnerability CVE-2025-53770

By Lex Crumpton, Allison Henao, Amy L. Robertson

August 4, 2025

The exploitation of critical zero-day vulnerabilities in Microsoft SharePoint highlights that adversaries don’t always need new tools to succeed. By chaining familiar techniques with newly discovered flaws, they can bypass defenses without deploying novel malware or infrastructure. Sometimes, all it …

Continue reading

Vizualize, Understand, and Share with Attack Flow 3

By Mark Haase, Mike Carenzo, Mike Cunningham, Suneel Sundar

July 8, 2025

From large multinationals with mature cybersecurity programs to small startups, organizations around the globe use Attack Flow to track the APTs that are tracking them…

Continue reading

Threat-Informed Defense for the Financial Sector

By Gananand Kini, Tiffany Bergeron

June 16, 2025

The Cyber Risk Institute Profile is a distillation of the NIST Cybersecurity Framework tailored to address the financial services sector’s regulatory environment. Financial institutions, financial services companies, financial firms, and their third-party providers use the CRI Profile …

Continue reading

Ambiguous Techniques: Determine Malice through Context

By Antonia Feffer, Mike Cunningham, Suneel Sundar

May 13, 2025

An ambiguous technique is a MITRE ATT&CK® technique whose observable characteristics are insufficient to determine intent. This means that the observable data does not allow us to confidently ascertain whether the intent…

Continue reading