Published Projects

Sightings Ecosystem

Project Summary

This project provides cybersecurity defenders and researchers with critical insight into real-world adversary behaviors mapped to ATT&CK. The ecosystem fundamentally advances the collective ability to see threat activity across organizational, platform, vendor, and geographical boundaries. Voluntarily contributed raw “sightings”, or observations of specific adversary TTPs, are anonymized, and aggregated to produce insights into the most commonly used attacker techniques.

Problem

Defenders lack visibility into which adversary behaviors they should focus their attention on first.

Solution

Build an ecosystem for organizations to safely contribute ATT&CK-specific detection data, empowering defenders to have clear insights what techniques attackers use in the wild.

Impact

The sightings ecosystem injects real-world data and insights from that data into the decision-making process of defenders, allowing them to focus their resources on the highest priority problems


Funding Research Participants



Non-Profit Participants


Explore More of Our Work:

Ambiguous Techniques

Building upon the research of Summiting the Pyramid, Ambiguous Techniques is a methodology to determine malicious intent behind seemingly benign …

Continue reading

Prioritize Known Exploited Vulnerabilities

Prioritize Known Exploited Vulnerabilities shows defenders how to take a threat informed approach to vulnerability management.

Continue reading

Security Stack Mappings – Hardware-Enabled Defense

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …

Continue reading

Stay Informed

Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.