Obstracts is the blog feed reader used by the worlds most targetted cyber-security teams. Let me show you why.| dogesec
Many attacks are described using free text. This happens, then this, then this. Whereas detection rules provide a structured way to represent these descriptions with actionable content. Attack Flows are the perfect vehicle to combine the two approaches.| dogesec
MITRE ATT&CK techniques are useful, but they don’t capture the sequence of an attack. Enter Attack Flows.| dogesec