- \n
- MITRE ATT&CK<\/a> (MITRE ATT&CK)<\/li>\n
- Enterprise tactics<\/a> (MITRE ATT&CK)<\/li>\n
- Enterprise Techniques<\/a> (MITRE ATT&CK)<\/li>\n
- Cybersecurity Threat Trends Report<\/a> (\u0421isco Umbrella)<\/li>\n
- awesome-threat-intelligence<\/a> (Github)<\/li>\n
- MISP Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing<\/a> (MISP)<\/li>\n
- Known Exploited Vulnerabilities Catalog <\/a>(CISA)<\/li>\n
- Chinese State-Sponsored Cyber Operations: Observed TTPs<\/a> (CISA)<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"
What are Tactics, Techniques, and Procedures (TTPs)? Tactics, techniques, and procedures (TTPs) are the strategic plans, methodologies, and actions an adversary uses to develop and conduct an attack. The term, which has its roots in the military, is used in cybersecurity to describe how a\u00a0threat actor might conduct a\u00a0cyberattack. It\u2019s important for security professionals to […]<\/p>\n","protected":false},"author":7813,"featured_media":161561,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[255,218],"class_list":["post-161385","definition","type-definition","status-publish","format-standard","has-post-thumbnail","hentry","definitioncat-cyber-threats","definitioncat-cybersecurity"],"acf":[],"yoast_head":"\n
What are Tactics, Techniques, and Procedures? Definition & Uses<\/title>\n\n\n\n\n\n\n\n\n\n\n\t\n\t\n\t\n\n\n\n\t\n - Enterprise tactics<\/a> (MITRE ATT&CK)<\/li>\n