Red Team Threat Intel

Introduction

What is Threat Intelligence

Applying Threat Intel to the Red Team

The TIBER-EU Framework

TTP Mapping

Other Red Team Applications of CTI

Creating a Threat Intel Driven Campaign

Conclusion

Last updated