Blog
The DOGESEC blog
-
A Graph of Credit Card Fraud using STIX
PRODUCTS July 29, 2024
Using STIX 2.1 to track fraudulent credit card transactions so that they can be traversed on a graph. -
Mapping CVEs to MITRE ATT&CK
Being able to label CVEs with ATT&CK data allows for rich filtering, e.g. what CVEs use ATT&CK Technique X?. Here's how to create those labels in STIX 2.1. -
The Problems with Modelling Countries as STIX Objects
PRODUCTS July 17, 2024
And why we built a small utility to solve them for you. -
Getting Started with MITRE ATT&CK Navigator
TUTORIAL PRODUCTS July 11, 2024
The MITRE ATT&CK Navigator is a very useful tool to explore the MITRE ATT&CK framework. Here is how I've used it. -
Getting Started with MITRE TRAM
TUTORIAL PRODUCTS July 08, 2024
MITRE TRAM automatically extracts ATT&CK Techniques being discussed in reports. -
MITRE ATT&CK is More Than Tactics and Techniques
TUTORIAL PRODUCTS July 04, 2024
Software, Data Sources, Data Components, Campaigns etc., make the MITRE ATT&CK data set even more powerful than you might realise. -
An Introduction to Writing Sigma Rules
TUTORIAL PRODUCTS June 27, 2024
Sigma Rules are becoming more widely adopted. You should probably learn how to write them. Let me show you. -
Spin Up Your Own TAXII Server in 10 Minutes
We built an open-source TAXII server. This post describes how you can use it to start sharing your threat intelligence. Minimal technical knowledge required. -
A Better Way of Working with RSS and ATOM Feeds
Blog feeds are incredibly useful for security research, but there are many limitations that make working with them tedious. Here is how our team became significantly more efficient using them. -
Creating a Cyber Threat Intelligence Knowledgebase Graph
Joining the data held in knowledge-bases like MITRE ATT&CK allows for rich classification of cyber threat intelligence. Here is how we do that, so you can too.