A curated collection of companies that have publicly disclosed adversary tactics, techniques, and procedures (TTPs) following security breaches. The resource provides structured information about various security incidents, including breach dates, identified adversaries, and source documentation. The collection serves as a reference for security professionals analyzing real-world attack patterns and methodologies used by threat actors. It includes data from notable organizations such as Microsoft, Cloudflare, Boeing, and other major companies that have experienced measurable security incidents. Each entry in the collection documents the specific tactics and techniques employed during the breach, providing insights into adversary behavior and attack vectors. The information is sourced from official breach reports, security advisories, and public disclosures made by the affected organizations. This resource supports threat intelligence analysis, incident response planning, and security research by offering documented examples of actual attack scenarios and their associated TTPs.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A comprehensive SQL injection cheat sheet covering various database management systems and techniques.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.