A threat intelligence program helps an organization generate their own threat intelligence information and track trends to inform defensive priorities to mitigate risk.
Domain | ID | Name | Use | |
---|---|---|---|---|
ICS | T0820 | Exploitation for Evasion |
Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization. |
|
ICS | T0890 | Exploitation for Privilege Escalation |
Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization. |
|
ICS | T0866 | Exploitation of Remote Services |
Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization. |