Threat Objects & Tags
-
New objects added and existing objects updated with new Technique relationships derived from researcher Rachel James' “Adversary Use of AI” community project. We are proud to have the opportunity to collaborate with partners from across the threat-informed defense community to continue extending our knowledge base with valuable content.
-
View the full collection of new/updated objects under the “Targeted Technologies” tag family > new “AI Threats_Use of AI” tag
-
Consider adding relevant objects to Threat Profiles. A Technique Set containing just the Techniques referenced in the repository can be added to tenants on request.
-
-
New Campaign object for CISA’s latest advisory about unspecified “Iranian cyber actors” who used brute force & other credential access techniques to compromise various critical infrastructure entities
-
Attack methods featured several less-referenced Techniques, including modify/disable MFA mechanisms (T1556.006), Device Registration (T1098.005), Trust Modification (T1484.002), and MFA request generation (T1621).
-