MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) is a curated knowledge base and model forcyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and verifying defenses work as expected.

The list Top 10 Most Used ATT&CK Techniques herein was collected thanks to our vFeed Vulnerability Intelligence mapping to the latest MITRE ATT&CK Framework v8.2.

Connecting the Dots !

By analyzing the data collected, it is obvious that certain occurrences stand out to create a model of a typical attack / attacker behaviors

It has been observed that the most used tactic is TA0005 “Defense Evasion” (https:// attack.mitre.org/tactics/TA0005/). It is therefore necessary to companies to channel their energy in order to carry out the necessary hardening to align with the mitigations and detection rules and tweaks highlighted with every ATT&CK Technique.