Free
Intel
Hub
Feed
Sources
The Hacker News
Dark Reading
BleepingComputer
SecurityWeek
Krebs on Security
Help Net Security
The CyberWire
SC Media
HackRead
GBHackers
CSO Online
Cybersecurity Dive
Information Security Buzz
Security Affairs
Graham Cluley
SANS ISC
WeLiveSecurity
Google Security Blog
Cisco Advisories
Palo Alto Networks
CISA Advisories
US-CERT Alerts
Microsoft Security Blog
Mandiant Blog
Recorded Future
Talos Intelligence
Unit 42
SentinelOne Blog
CrowdStrike Blog
Sophos News
Threatpost
Infosecurity Magazine
Cyberscoop
The Record
SecurityTrails Blog
Naked Security
Schneier on Security
Qualys Blog
Rapid7 Blog
Tenable Blog
Fortinet Blog
Trend Micro Research
Kaspersky Securelist
ESET Research
Check Point Research
Zscaler Blog
Proofpoint Blog
Elastic Security Labs
Akamai Blog
Cisco Talos Blog
Volexity Blog
NIST NVD
Exploit Database
Packet Storm
Full Disclosure
CERT-EU News
Wordfence Blog
Trail of Bits
PortSwigger Research
PortSwigger Daily Swig
Hacker One Hacktivity
Zero Day Initiative
Google Project Zero
AWS Security Blog
Cloudflare Blog
Mozilla Security Blog
View all sources
Vendors
Microsoft
Google
Apple
Amazon
Cisco
Intel
Linux
GitHub
Rapid7
Check Point
Cloudflare
Palo Alto Networks
F5
Oracle
Citrix
View all vendors
Threats
Data Breach
Zero-Day
Ransomware
CVE
Vulnerability Disclosure
Advisory
TTPs
Campaigns
Operational Technology
Phishing
Malware
Supply Chain
DDoS
Insider Threat
View all types
Sectors
Financial
Healthcare
Defense
Government
Manufacturing
Energy
Telecommunications
Retail
Education
Transportation
Food & Beverages
Technology
Legal
Media
View all sectors
Actors
Threat Groups
Software & Malware
Campaigns
Tools
Trending
Threat Heatmap
MITRE ATT&CK
IOC Feed
Bookmarks
RSS Feed
API
Alerts
☰
MITRE ATT&CK Mapping
Articles mapped to MITRE ATT&CK techniques. Select a technique to view matching articles.
Navigator Layer (30d)
7d Layer
90d Layer
Initial Access
T1566
Phishing
T1566.001
Spearphishing Attachment
T1566.002
Spearphishing Link
T1190
Exploit Public-Facing Application
T1133
External Remote Services
T1078
Valid Accounts
T1195
Supply Chain Compromise
T1189
Drive-by Compromise
Execution
T1059
Command and Scripting Interpreter
T1059.001
PowerShell
T1203
Exploitation for Client Execution
T1204
User Execution
Persistence
T1053
Scheduled Task/Job
T1547
Boot or Logon Autostart Execution
T1543
Create or Modify System Process
Privilege Escalation
T1548
Abuse Elevation Control Mechanism
T1068
Exploitation for Privilege Escalation
Defense Evasion
T1027
Obfuscated Files or Information
T1562
Impair Defenses
T1070
Indicator Removal
Credential Access
T1110
Brute Force
T1555
Credentials from Password Stores
T1003
OS Credential Dumping
T1557
Adversary-in-the-Middle
T1556
Modify Authentication Process
Discovery
T1046
Network Service Discovery
Lateral Movement
T1021
Remote Services
Command and Control
T1071
Application Layer Protocol
T1573
Encrypted Channel
T1572
Protocol Tunneling
Exfiltration
T1041
Exfiltration Over C2 Channel
T1567
Exfiltration Over Web Service
Impact
T1486
Data Encrypted for Impact
T1489
Service Stop
T1498
Network Denial of Service
T1491
Defacement
T1529
System Shutdown/Reboot
Resource Development
T1583
Acquire Infrastructure
T1588
Obtain Capabilities
Reconnaissance
T1592
Gather Victim Host Information
T1598
Phishing for Information