A threat intelligence program helps an organization generate their own threat intelligence information and track trends to inform defensive priorities to mitigate risk.
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1656 | 伪装 |
Threat intelligence helps defenders and users be aware of and defend against common lures and active campaigns that have been used for impersonation. |
|
| Enterprise | T1212 | 凭据访问漏洞利用 |
Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization. |
|
| Enterprise | T1068 | 权限提升漏洞利用 |
Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization. |
|
| Enterprise | T1210 | 远程服务漏洞利用 |
Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization. |
|
| Enterprise | T1211 | 防御规避漏洞利用 |
Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization. |
|