the dogesec blog
much post. so knowledge. many intel. very subscribe. wow.
-
Beyond the ATT&CK Matrix: How to Build Dynamic Attack Flows with STIX
tutorial developers analyst March 17, 2025
MITRE ATT&CK techniques are useful, but they don’t capture the sequence of an attack. Enter Attack Flows. -
An Introduction pySigma: Converting Sigma Rules to Work with Your SIEM
tutorial developers February 10, 2025
Learn how to seamlessly convert Sigma Rules into queries for your SIEM. Follow along with real examples. -
Writing Advanced Sigma Detection Rules: Using Correlation Rules
analysts tutorial January 13, 2025
Correlation Rules allow you to detect threats by linking multiple events together based on a meaningful relationship. -
Writing Effective Sigma Detection Rules: A Guide for Novice Detection Engineers
analysts tutorial December 16, 2024
Sigma Rules are becoming more widely adopted as the standard detection language. Learning how to write them is not difficult. Let me show you. -
Bad Software Keeps Cyber Security Companies in Business
analysts research November 18, 2024
Despite countless frameworks, best practices, blog posts... so many developers still hardcode credentials into their code. -
Enriching Vulnerabilities to Create an Intelligence Graph
analysts developers October 14, 2024
We do a lot of our research into vulnerabilities. To aid this, we enrich CVEs using many remote sources of intelligence. Here is a walk-through showing how we connect CVEs to EPSS scores, CISA KEVs, MITRE ATT&CK, CWEs, and CAPECs. -
Writing Detection Rules to Identify if Products in my Stack are Vulnerable
developers September 16, 2024
Developing on last weeks post, I show you how to construct STIX Patterns to automatically flag which products are affected by published CVEs. -
How Known Affected Software Configorations on the CVE Website are Constructed
analysts August 12, 2024
I wanted to write detection rules to identify what products are vulnerable to a CVE. In this post I walk you through my research. -
PSA: MITRE ATTCK is More Than Tactics and Techniques
analysts developers July 15, 2024
Software, Data Sources, Data Components, Campaigns, and more, make MITRE ATT&CK even more powerful than you might first realise. In this post I uncover the parts of ATT&CK you might not be aware of. -
Fortifying AI: How MITRE ATLAS Shields Artificial Intelligence from Adversarial Threats
analysts June 17, 2024
Discover how MITRE ATLAS is helping to defend AI systems as I share a detailed explanation of how the knowledge-base is architected.