Last updated 1 year ago
Introduction
What is Threat Intelligence
Applying Threat Intel to the Red Team
The TIBER-EU Framework
TTP Mapping
Other Red Team Applications of CTI
Creating a Threat Intel Driven Campaign
Conclusion