Attack Flow v3
With Attack Flow, you will capture the entire attack and communicate what matters!
July 8, 2025
With Attack Flow, you will capture the entire attack and communicate what matters!
Tracking adversary behaviors one action at a time makes it hard to build effective defenses against multi-phased attacks.
Create a language, and associated tooling, to describe flows of ATT&CK techniques and combine those flows into patterns of behavior.
Visualize and communicate how adversaries operate to define defensive actions.
With Attack Flow, you will capture the entire attack and communicate what matters!
Connect adversarial threat mitigations to cybersecurity program resources tailored to the financial sector, namely the Cyber Risk Institute …
Building upon the research of Summiting the Pyramid, Ambiguous Techniques is a methodology to determine malicious intent behind seemingly benign …
Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.