Blog
The dogesec blog
-
An Introduction pySigma: Converting Sigma Rules to Work with Your SIEM
TUTORIAL February 10, 2025
Learn how to seamlessly convert Sigma Rules into queries for your SIEM. Follow along with real examples. -
Beyond the ATT&CK Matrix: How to Build Dynamic Attack Flows with STIX
TUTORIAL February 03, 2025
MITRE ATT&CK techniques are useful, but they don’t capture the sequence of an attack. Enter Attack Flows. -
Writing Advanced Sigma Detection Rules: Using Correlation Rules
TUTORIAL January 27, 2025
Correlation Rules allow you to detect threats by linking multiple events together based on a meaningful relationship. -
CTI Developers: We Built an API for MITRE ATT&CK, CWE, CAPEC, ATLAS... and more!
PRODUCTS January 20, 2025
Here is a quick-start guide to CTI Butler showing you how much easier it makes working with these frameworks. -
Getting Started with the MITRE ATT&CK Navigator
TUTORIAL January 13, 2025
The MITRE ATT&CK Navigator is a very useful tool to explore the MITRE ATT&CK (and other similar frameworks). In this post I take a look what you can do with Navigator and how it works under the hood so that you can use it to model your own ATT&CK-like frameworks. -
Fighting Disinformation: Classifying Your Research Using Standardised Disinformation Tactics and Techniques
RESEARCH January 06, 2025
Our intel team is increasingly using the DISARM framework to classify parts of our research as disinformation campaigns continue increase. In this post I will introduce the DISARM data structure. -
Fortifying AI: How MITRE ATLAS Shields Artificial Intelligence from Adversarial Threats
RESEARCH December 30, 2024
Discover how MITRE ATLAS is helping to defend AI systems as I share a detailed explanation of how the knowledge-base is architected. -
Enriching Vulnerabilities to Create an Intelligence Graph
RESEARCH December 23, 2024
We do a lot of our research into vulnerabilities. To aid this, we enrich CVEs using many remote sources of intelligence. Here is a walk-through showing how we connect CVEs to EPSS scores, CISA KEVs, MITRE ATT&CK, CWEs, and CAPECs. -
How CTI Butler Creates a Threat Intelligence Graph of Common Frameworks
RESEARCH December 16, 2024
CTI Butler links many common knowledge bases, for example linking MITRE ATT&CK to CAPEC objects, to improve the context of our research. This post describes the logic CTI Butler employs behind the scenes to do this. -
An Analysis of the Latest Sigma Rules Release
RESEARCH December 09, 2024
In this post I walk you through the database queries we use to compare Sigma Rules releases. We use these to identify the detail of what has changed before we push any updates internally.
1 of 4
Older posts →