Skip to content

Threat Intel Content Updated: 10/22/24

  • October 22, 2024

Threat Objects & Tags

  • New objects added and existing objects updated with new Technique relationships derived from researcher Rachel James' “Adversary Use of AI” community project. We are proud to have the opportunity to collaborate with partners from across the threat-informed defense community to continue extending our knowledge base with valuable content.

    • View the full collection of new/updated objects under the “Targeted Technologies” tag family > new “AI Threats_Use of AI” tag

    • Consider adding relevant objects to Threat Profiles. A Technique Set containing just the Techniques referenced in the repository can be added to tenants on request.

  • New Campaign object for CISA’s latest advisory about unspecified “Iranian cyber actors” who used brute force & other credential access techniques to compromise various critical infrastructure entities

    • Attack methods featured several less-referenced Techniques, including modify/disable MFA mechanisms (T1556.006), Device Registration (T1098.005), Trust Modification (T1484.002), and MFA request generation (T1621).

Data-Driven Threat-Informed Defense

Meet Tidal Enterprise Edition

Quickly and easily develop custom threat profiles and defensive stacks, see your coverage and identify gaps and redundancies, and get daily recommendations to improve your cybersecurity posture.