{"/blog/quickstart_guide_stix2_python":"https://www.dogesec.com/blog/your_first_stix_object_a_developer_guide_to_stix_with_python/","/blog/create_custom_stix_objects":"https://www.dogesec.com/blog/stix_extensions_in_the_wild_how_to_add_what_the_spec_forgot/","/blog/building_custom_attack_content_with_workbench":"https://www.dogesec.com/blog/building_custom_attck_content_with_workbench/","/blog/getting_started_attack_navigator":"https://www.dogesec.com/blog/getting_started_attck_navigator/","/blog/we_built_mitre_attack_api":"https://www.dogesec.com/blog/we_built_mitre_attck_api/","/blog/modelling_locations_as_stix_object":"https://www.dogesec.com/blog/modelling_locations_as_stix_objects/","/blog/introducing_disarm":"https://www.dogesec.com/blog/disarm_stix_based_framework_for_disinformation/","/blog/introduction-mitre-atlas":"https://www.dogesec.com/blog/atlas_stix_based_framework_for_ai/","/blog/introducing_mitre_atlas":"https://www.dogesec.com/blog/atlas_stix_based_framework_for_ai/","/blog/mitre_attack_data_structure":"https://www.dogesec.com/blog/mitre_attck_data_structure/","/blog/writing_detection_rules_to_identify_vulnerable_products":"https://www.dogesec.com/blog/writing_stix_patterns_to_identify_vulnerable_products/","/blog/enriching_vulnerabilities_in_pure_stix":"https://www.dogesec.com/blog/enriching_vulnerabilities_using_cwe_capec_attck_epss_kev_stix/","/blog/writing_sigma_rules":"https://www.dogesec.com/blog/writing_effective_sigma_rules_for_beginners/","/blog/writing_advanced_sigma_rules":"https://www.dogesec.com/blog/writing_advanced_sigma_correlation_rules/","/blog/using_sigma_cli_pysigma":"https://www.dogesec.com/blog/beginners_guide_to_using_sigma_cli_pysigma/","/blog/understading_structure_attack_flows":"https://www.dogesec.com/blog/understanding_structure_attack_flows_to_model_cti_reports/","/blog/understanding_structure_attack_flows":"https://www.dogesec.com/blog/understanding_structure_attack_flows_to_model_cti_reports/","/blog/detection_rules_attack_flows":"https://www.dogesec.com/blog/adding_sigma_detection_rules_into_attack_flows/","/blog/full_text_rss_atom_blog_feeds":"https://www.dogesec.com/blog/full_text_full_history_rss_atom_blog_feeds/","/blog/launching_obstracts_open_source":"https://www.dogesec.com/blog/turn_any_blog_into_structured_threat_intelligence/","/blog/introducing-cyber-threat-exchange":"https://www.dogesec.com/blog/introducing_cyber-threat_exchange/"}