A post full of code examples that will give you everything you need to start creating STIX objects to make it simple to share your threat research.| dogesec
If you’re a cyber threat intelligence analyst you probably use txt2stix, but do you know everything it’s currently capable of?| dogesec
Discover how MITRE ATLAS is helping to defend AI systems as I share a detailed explanation of how the knowledge-base is architected.| dogesec
Sometimes the default STIX 2.1 objects will not be broad enough for your needs. This post describes how you can extend the STIX specification when required.| dogesec
STIX 2.1 allows you to tell stories by connecting objects together to form the story-line of cyber actors, campaigns, incidents, and much more. In this post I explain how.| dogesec
Here is a quick-start guide to CTI Butler showing you how much easier it makes working with these frameworks.| dogesec