MITRE ATT&CK Framework and osquery: Scientific Detection – Uptycs
Traditional detection techniques are based on indicators of compromise (IOCs). The problem with this method is that many attacks can slip through the cracks; attackers can fairly easily change IOCs, like IP addresses and file hashes, to avoid detection. What they can’t change so easily are behaviors—their tactics, techniques, and procedures (TTPs) used in...