Sometimes the default STIX 2.1 objects will not be broad enough for your needs. This post describes how you can extend the STIX specification when required.| dogesec
STIX 2.1 allows you to tell stories by connecting objects together to form the story-line of cyber actors, campaigns, incidents, and much more. In this post I explain how.| dogesec
This document describes the STIX language for expressing cyber threat and observable information and defines its concepts and overall structure.| docs.oasis-open.org
I recently conducted a project to identify the most prolific ransomware based on the ransom payments being made. Let me walk you through how I did it.| DOGESEC
Take the list of recognised countries and regions. Create STIX objects for them. Make them available to everyone so that the CTI world has a single way of representing them.| DOGESEC
Avoid confusion when referring to countries and their subdivisions with this standard.| ISO