Breach Report Collection Logo

Breach Report Collection

0
Free
Visit Website

A collection of companies that disclose adversary TTPs (Tactics, Techniques, and Procedures) after they have been breached, useful for analysis of intrusions launched by adversaries with measurable effects and impact. The collection includes a list of companies that have been breached, along with the breach date, adversary, and source of the information. The list includes well-known companies such as Microsoft, Cloudflare, Boeing, and many others, and provides valuable insights into the tactics and techniques used by adversaries.

FEATURES

ALTERNATIVES

CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.

Check if an IP address was used as a Tor relay on a given date.

Facilitates distribution of Threat Intelligence artifacts to defensive systems.

Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.

Provides breach and attack simulation products for security control validation, offering three different products to meet the needs of organizations of various sizes and maturity levels.

Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

A modular malware collection and processing framework with support for various threat intelligence feeds.