If you’re a cyber threat intelligence analyst you probably use txt2stix, but do you know everything it’s currently capable of?| dogesec
Discover how MITRE ATLAS is helping to defend AI systems as I share a detailed explanation of how the knowledge-base is architected.| dogesec
Sometimes the default STIX 2.1 objects will not be broad enough for your needs. This post describes how you can extend the STIX specification when required.| dogesec
Here is a quick-start guide to CTI Butler showing you how much easier it makes working with these frameworks.| dogesec