Cybersecurity RSS

APT campaigns, ransomware, zero-days, supply chain attacks, threat intelligence — the threat landscape decoded

Keygraph Shannon autonomous AI penetration testing with proof-of-concept exploits
AI Security

Keygraph Shannon: The Autonomous AI Pentester That Writes Its Own Exploits

Shannon is a fully autonomous AI penetration testing framework that performs white-box security assessments. It analyzes application source code, crafts attack strategies, then validates every vulnerability with a live proof-of-concept exploit in the browser — no false positives, no manual intervention.

GitHub

What Shannon Does Differently

Most vulnerability scanners generate a wall of theoretical findings. Shannon takes the opposite approach: it reads your source code to understand application logic, then attacks your running application through a real browser to prove the vulnerability is exploitable. Every finding comes with a reproducible proof-of-concept.

Architecture

Shannon uses Temporal workflow orchestration to run parallel AI agents, each targeting different attack vectors simultaneously. The system operates in several phases:

Reconnaissance — integrates Nmap (port scanning), Subfinder (subdomain enumeration), WhatWeb (technology fingerprinting), and Schemathesis (API schema fuzzing)
Code analysis — the AI reads the target application source code from a local repo to identify vulnerable patterns, authentication logic, and data flows
Attack execution — exploits are crafted and executed live in a dedicated browser environment
Validation — every finding is verified with a working proof-of-concept before being reported

Vulnerability Coverage

Injection attacks — SQL injection, command injection, template injection
Cross-Site Scripting (XSS) — reflected, stored, and DOM-based variants
Server-Side Request Forgery (SSRF) — internal network pivoting and cloud metadata access
Broken authentication — session management flaws, auth bypass, privilege escalation
• Additional vulnerability classes are in active development

Benchmark Results

Shannon Lite achieved a 96.15% success rate on the hint-free, source-aware XBOW Benchmark — the leading AI security evaluation. Against OWASP Juice Shop (a deliberately vulnerable web app), it identified over 20 critical vulnerabilities including:

• Complete authentication bypass
• Database exfiltration via SQL injection
• Multiple stored and reflected XSS chains
• SSRF leading to internal service access

Setup & Requirements

Docker (mandatory — Shannon runs in containers)
Anthropic API key (Claude recommended for optimal performance)
• Target application source code in ./repos/ directory
• Optional YAML config for authenticated testing (supports TOTP 2FA and OAuth flows)

Run with: docker compose up followed by shannon run --target <app>

Editions

Shannon Lite (AGPL-3.0) — open-source version for security teams and researchers testing their own applications
Shannon Pro (commercial) — adds LLM-powered data flow analysis, advanced detection, CI/CD integration, and dedicated support as part of the Keygraph Security & Compliance Platform (SOC 2, HIPAA)

Limitations

• White-box only — requires source code access (no black-box scanning yet)
• Docker-dependent — no native installation
• API rate limits — Anthropic subscription tiers may throttle long assessments
• Router Mode (OpenAI/Gemini support via OpenRouter) is experimental and may produce inconsistent results

“Shannon doesn’t report theoretical risk. It shows you the exact exploit, the exact payload, and the exact response from your application.” — Keygraph HQ

Created by Austrian developer Peter Steinberger’s team at Keygraph HQ. The broader Keygraph platform aims to automate security compliance end-to-end. Shannon is the offensive security component that replaces annual pentesting engagements with continuous, on-demand AI-driven assessments.

SolarWinds supply chain attack diagram showing Orion update compromise
Supply Chain Dec 2020

SolarWinds: The Supply Chain Attack That Compromised 18,000 Organizations

Russian intelligence (APT29/Cozy Bear) trojanized the SolarWinds Orion software update, distributing malware to 18,000 organizations including the U.S. Treasury, Commerce Department, and Fortune 500 companies. The most consequential supply chain attack in history.

Read source

In December 2020, cybersecurity firm FireEye (now Mandiant) discovered that its own red team tools had been stolen. The investigation revealed something far worse: a compromise of SolarWinds’ Orion IT monitoring platform that had been active since at least March 2020.

How the attack worked:

Build system compromise — APT29 gained access to SolarWinds’ software build pipeline and injected malicious code (SUNBURST) into legitimate Orion software updates
Trojanized updates — versions 2019.4 through 2020.2.1 contained the backdoor, signed with SolarWinds’ legitimate code-signing certificate
18,000 installations — all organizations that applied the update received the malware. The attackers selectively activated the backdoor on ~100 high-value targets
SUNBURST → TEARDROP → Cobalt Strike — the attack chain progressed from initial backdoor to custom malware to commodity post-exploitation tools

High-value targets confirmed compromised:

• U.S. Treasury Department
• U.S. Department of Commerce (NTIA)
• Department of Homeland Security
• Department of Energy / NNSA (nuclear weapons agency)
• Microsoft, Intel, Cisco, Deloitte
• FireEye/Mandiant (which led to discovery)

Why it changed everything: SolarWinds proved that trusted software supply chains are a viable attack vector for nation-state operations. It forced a fundamental rethinking of software integrity, build pipeline security, and zero-trust architecture. President Biden signed Executive Order 14028 in May 2021, mandating SBOMs (Software Bill of Materials) and improved supply chain security across federal agencies.

“This is the largest and most sophisticated attack the world has ever seen.” — Brad Smith, Microsoft President
MOVEit file transfer zero-day mass exploitation by Cl0p ransomware
Ransomware Jun 2023

MOVEit: Zero-Day Mass Exploitation That Breached 2,500+ Organizations

The Cl0p ransomware gang exploited a zero-day SQL injection in Progress Software’s MOVEit Transfer, stealing data from over 2,500 organizations and affecting 90+ million individuals. The attack redefined “mass exploitation” of file transfer appliances.

Read source

On May 31, 2023, Progress Software disclosed CVE-2023-34362 — a critical SQL injection vulnerability in MOVEit Transfer. By the time the advisory was published, Cl0p had already been exploiting it for weeks.

The attack pattern:

Zero-day SQLi — unauthenticated SQL injection in MOVEit’s web interface allowed arbitrary code execution
Web shell deployment — Cl0p dropped a web shell named “human2.aspx” for persistent access
Mass data exfiltration — automated scripts extracted files from every accessible MOVEit server before anyone noticed
Extortion without encryption — Cl0p didn’t deploy ransomware; they stole data and threatened to publish it

Scale of the breach:

• 2,500+ organizations confirmed breached
• 90+ million individuals affected
• Shell, British Airways, BBC, Johns Hopkins, U.S. government agencies, multiple state DMVs
• Estimated $10B+ in total damages

Why MOVEit matters: It demonstrated that file transfer appliances (MOVEit, GoAnywhere, Accellion) are prime targets because they sit on network perimeters, handle sensitive data, and often aren’t patched quickly. Cl0p developed a repeatable playbook: find zero-days in file transfer tools, mass-exploit them before patches exist, and extort victims with stolen data. They’ve done it three times now.

Volt Typhoon Chinese APT pre-positioning in US critical infrastructure
Nation-State May 2023

Volt Typhoon: Chinese APT Pre-Positioning in U.S. Critical Infrastructure

A Chinese state-sponsored threat group has been quietly burrowing into U.S. critical infrastructure — water, energy, transportation, telecom — not to steal data, but to maintain persistent access for potential disruption during a future conflict over Taiwan.

Read source

In May 2023, Microsoft and the Five Eyes intelligence alliance publicly attributed Volt Typhoon to China’s state-sponsored cyber operations. But the group had been active since at least mid-2021, quietly compromising critical infrastructure across the United States.

What makes Volt Typhoon different:

Living-off-the-land (LOTL) — instead of deploying custom malware, Volt Typhoon uses built-in Windows tools (PowerShell, WMI, netsh, certutil) to blend in with normal admin activity
Pre-positioning, not espionage — the goal isn’t data theft. It’s maintaining persistent access that could be weaponized during a Taiwan conflict to disrupt U.S. military logistics and civilian infrastructure
SOHO router botnets — compromised small office/home office routers (Cisco, Netgear, ASUS) serve as operational relay nodes, making traffic appear to originate from legitimate U.S. IP addresses
Multi-year persistence — in some cases, Volt Typhoon maintained access for 5+ years undetected

Targets confirmed by CISA/FBI:

• Water and wastewater systems
• Energy sector (electric utilities, pipelines)
• Transportation systems
• Communications infrastructure
• U.S. territories including Guam (critical for Pacific military operations)

The strategic implication: FBI Director Christopher Wray called it “the defining threat of our generation.” Volt Typhoon represents a shift from cyber espionage to cyber pre-positioning for wartime disruption. The Chinese government is building the capability to “flip a switch” and cause real-world damage to American infrastructure during a crisis.

Midnight Blizzard Russian SVR targeting Microsoft and government emails
APT Jan 2024

Midnight Blizzard: Russian SVR Compromises Microsoft’s Corporate Email

The same Russian SVR hackers behind SolarWinds (now tracked as Midnight Blizzard/APT29) breached Microsoft’s corporate email, accessing senior leadership and cybersecurity team accounts. The attack started with a password spray on a legacy test tenant with no MFA.

Read source

In January 2024, Microsoft disclosed that Midnight Blizzard had compromised its corporate email systems starting in late November 2023. The attackers specifically targeted email accounts of Microsoft’s senior leadership, legal, and cybersecurity teams.

How they got in:

Password spray — low-and-slow credential stuffing against a legacy, non-production test tenant account
No MFA — the test tenant didn’t have multi-factor authentication enabled
OAuth app abuse — used the compromised test account to create malicious OAuth applications with elevated permissions
Lateral movement — the OAuth apps were used to access Microsoft corporate email mailboxes

What was accessed:

• Email accounts of senior leadership and executives
• Cybersecurity team emails (including correspondence about Midnight Blizzard itself)
• Legal team communications
• Some source code repositories (disclosed in March 2024 follow-up)
• Customer communications (some federal agencies notified)

The bigger picture: Midnight Blizzard wasn’t after financial data. They wanted to know what Microsoft knew about them — a classic counter-intelligence operation. The fact that Microsoft, with its massive security team, was compromised via a legacy test account with no MFA is a sobering reminder that forgotten infrastructure is the attacker’s best friend.

The breach led to a Congressional hearing and CSRB investigation. Microsoft responded with the “Secure Future Initiative” (SFI), making security its top corporate priority above all other features.

Ivanti VPN zero-day mass exploitation and CISA emergency directive
Zero-Day Jan 2024

Ivanti VPN Zero-Days: Mass Exploitation of Edge Devices Forces CISA Emergency Directive

Two zero-day vulnerabilities in Ivanti Connect Secure VPN appliances were exploited by Chinese state-sponsored actors and then by multiple threat groups. CISA issued Emergency Directive 24-01, ordering all federal agencies to disconnect Ivanti VPN appliances — a near-unprecedented move.

Read source

In January 2024, Volexity disclosed two zero-day vulnerabilities in Ivanti Connect Secure (formerly Pulse Secure) VPN appliances: CVE-2023-46805 (authentication bypass) and CVE-2024-21887 (command injection). Chained together, they allowed unauthenticated remote code execution.

The exploitation timeline:

Dec 2023 — UNC5221 (Chinese state-sponsored) begins targeted exploitation
Jan 10, 2024 — Volexity publishes advisory; Ivanti releases mitigation (not a patch)
Jan 15-18 — mass exploitation begins as other threat actors reverse-engineer the mitigation
Jan 19 — CISA issues Emergency Directive 24-01
Jan 31 — Ivanti releases actual patches (21 days after disclosure)
Feb 1 — CISA orders all federal agencies to disconnect and factory-reset Ivanti appliances

Why edge devices are the new target: VPN appliances, firewalls, and email gateways sit at the network perimeter. They process untrusted traffic, run complex code, and often lack endpoint detection. Attackers have shifted from phishing to directly exploiting these “edge” devices because:

• They bypass all internal security controls
• They’re hard to monitor with traditional EDR
• They often run custom Linux/BSD that defenders don’t instrument well
• Patches take weeks or months to deploy

Ivanti wasn’t alone: Citrix, Fortinet, Barracuda, and Cisco all had critical edge device vulnerabilities exploited in 2023-2024. The perimeter is the new battleground.

XZ Utils open-source supply chain backdoor discovered before deployment
Supply Chain Mar 2024

XZ Utils Backdoor: The Open-Source Supply Chain Attack That Almost Worked

A sophisticated, multi-year social engineering campaign inserted a backdoor into XZ Utils, a compression library used by virtually every Linux distribution. An attacker using the identity “Jia Tan” spent two years building trust as a maintainer before injecting code that would have given SSH backdoor access to millions of servers.

Read source

On March 29, 2024, Microsoft engineer Andres Freund noticed that SSH logins on his Debian sid system were taking 500ms longer than expected. His investigation uncovered one of the most sophisticated supply chain attacks ever attempted.

The social engineering campaign (2021–2024):

2021 — “Jia Tan” (likely a state-sponsored persona) begins submitting legitimate patches to the XZ Utils project
2022 — Sock puppet accounts pressure the solo maintainer (Lasse Collin) to accept Jia Tan as co-maintainer, citing slow patch reviews
2023 — Jia Tan gains commit access and release authority
Feb 2024 — Malicious code inserted into XZ Utils 5.6.0 and 5.6.1 release tarballs (not visible in the Git repository)
Mar 29, 2024 — Andres Freund discovers the backdoor by noticing a 500ms SSH latency regression

How the backdoor worked:

• Malicious build scripts in the tarball (not in Git) modified the XZ library during compilation
• The modified library was loaded by systemd, which links against liblzma
• When OpenSSH (via systemd) processed SSH connections, the backdoor intercepted authentication
• Specific SSH keys would bypass authentication entirely — giving the attacker root shell access

The near-miss: The backdoored versions had already been included in Fedora 40 beta, Debian sid/testing, and several other rolling-release distributions. If it had reached stable releases of major distros, it would have provided a backdoor into millions of servers worldwide.

“This might be the best-executed supply chain attack we’ve seen described in the open, and it’s a nightmare scenario.” — Alex Stamos, SentinelOne CISO
Ransomware-as-a-Service ecosystem with LockBit and BlackCat affiliate model
Ransomware 2023–2025

Ransomware-as-a-Service: LockBit, BlackCat, and the Affiliate Economy

Ransomware has industrialized. Groups like LockBit and BlackCat/ALPHV operate as platforms, recruiting affiliates who execute attacks in exchange for 70-80% of ransom payments. LockBit alone was responsible for 25% of all ransomware attacks globally before its February 2024 takedown.

Read source

Modern ransomware isn’t a single hacker in a basement. It’s a multi-billion dollar criminal industry operating with the sophistication of a Silicon Valley startup — complete with recruitment, customer support, and revenue sharing.

How RaaS works:

Operators build and maintain the ransomware payload, negotiate infrastructure, and run leak sites
Affiliates gain initial access, deploy the ransomware, and exfiltrate data. They keep 70-80% of ransom payments
Initial access brokers (IABs) sell network access to affiliates for $500–$50,000 per organization
Double extortion — encrypt AND steal data, threatening to publish if ransom isn’t paid

Major RaaS operations:

LockBit — the most prolific ransomware group from 2022-2024. Over 1,700 attacks. Disrupted by Operation Cronos (FBI/NCA) in February 2024, but LockBitSupp attempted a comeback
BlackCat/ALPHV — first major ransomware written in Rust. Responsible for the $22M Change Healthcare attack. Pulled an exit scam on their own affiliates in March 2024
Cl0p — specializes in zero-day exploitation of file transfer tools (Accellion, GoAnywhere, MOVEit). Data theft without encryption
Black Basta — suspected Conti successor. Heavy targeting of healthcare and manufacturing

The economics: Total ransomware payments exceeded $1.1 billion in 2023 (Chainalysis data). The average ransom payment was $568,000. But the total cost to victims (downtime, remediation, reputation) is estimated at 10-15x the ransom amount.

Law enforcement has gotten more aggressive with takedowns and sanctions, but the RaaS model is resilient: when one group is disrupted, affiliates simply move to another platform.

CISA Known Exploited Vulnerabilities catalog driving federal patching
Policy 2021–Present

CISA KEV Catalog: How Known Exploited Vulnerabilities Drive Federal Patching

CISA’s Known Exploited Vulnerabilities (KEV) catalog has become the most important vulnerability prioritization tool in cybersecurity. With 1,100+ entries, it identifies vulnerabilities that are actively being exploited in the wild and mandates federal agencies patch them within strict deadlines.

Read source

Launched in November 2021 via Binding Operational Directive 22-01, the CISA KEV catalog solved a real problem: there are 200,000+ CVEs, but only a fraction are actually exploited in the wild. How do you prioritize?

How KEV works:

• CISA adds vulnerabilities that have confirmed active exploitation in the wild
• Each entry includes a remediation due date (typically 2-3 weeks for critical vulns)
• Federal civilian agencies (FCEB) are legally required to patch by the deadline
• The catalog is publicly available — any organization can use it for prioritization

Why KEV matters more than CVSS:

• CVSS scores rate theoretical severity. KEV tracks actual exploitation
• A CVSS 7.5 vulnerability in KEV is more urgent than a CVSS 9.8 that nobody’s exploiting
• Only ~4% of all CVEs are ever exploited in the wild. KEV identifies which ones
• Organizations using KEV for prioritization reduce their real-world risk more effectively than CVSS-only approaches

The impact: Since launch, KEV has driven measurable improvement in federal patching timelines. It’s also been widely adopted by private sector organizations as a baseline for vulnerability management programs. Many organizations now treat “is it in KEV?” as the first triage question for any new vulnerability.

KEV isn’t perfect — it only includes vulnerabilities CISA has confirmed as exploited, so it can lag behind real-time threat activity. But as a prioritization signal, it’s the best publicly available indicator of what attackers are actually targeting right now.

AI-powered phishing with deepfake voice cloning and generated spear phishing
AI Threats 2024–2025

AI-Powered Phishing: Deepfake Voices and Machine-Generated Spear Phishing at Scale

Attackers are using AI to generate convincing phishing emails, clone executive voices for vishing attacks, and create deepfake video for real-time impersonation. A Hong Kong finance worker was tricked into transferring $25 million after a video call with deepfakes of company executives.

Read source

AI hasn’t just changed how defenders work — it’s supercharging attackers too. The combination of large language models for text generation and voice/video synthesis tools has created a new class of social engineering attacks.

AI-enhanced attack vectors:

AI-generated spear phishing — LLMs craft personalized, grammatically perfect phishing emails in any language, at scale. No more “Dear Sir, I am a prince” tells
Voice cloning (vishing) — 3 seconds of audio is enough to clone a voice. Attackers impersonate CEOs, CFOs, and family members in phone calls
Real-time deepfake video — live video calls where the attacker appears as a trusted colleague or executive
Automated reconnaissance — AI scrapes LinkedIn, social media, and public records to build targeting profiles

Real-world incidents:

$25M Hong Kong heist — a finance worker joined a video call with what appeared to be the company CFO and other executives. All were deepfakes. He transferred $25.6 million
WormGPT/FraudGPT — underground LLMs specifically designed for generating phishing content, with no safety guardrails
CEO voice cloning — multiple reported cases of attackers cloning CEO voices to authorize wire transfers over the phone
Election deepfakes — AI-generated robocalls impersonating political figures to suppress voter turnout

The defender’s dilemma: Traditional phishing detection relied on spotting grammatical errors, suspicious domains, and generic templates. AI-generated phishing eliminates these signals. The emails are perfect, personalized, and sent from compromised legitimate accounts. Defense now requires behavioral analysis, out-of-band verification, and user awareness that “seeing is no longer believing.”

Critical infrastructure OT/ICS SCADA attacks on water utilities
Critical Infra 2023–2025

Critical Infrastructure Under Attack: SCADA, Unitronics, and Water Utility Breaches

Attacks on operational technology (OT) and industrial control systems (ICS) have escalated from theoretical to real. Iranian-linked hackers compromised water utilities via internet-exposed Unitronics PLCs. Russia’s Sandworm caused real-world power outages. The IT/OT convergence is creating attack surfaces that can cause physical damage.

Read source

Critical infrastructure — water, power, gas, transportation — runs on Operational Technology (OT) and Industrial Control Systems (ICS) that were designed decades ago with zero security considerations. Now they’re connected to the internet, and threat actors have noticed.

Notable OT/ICS attacks (2021–2025):

Unitronics PLCs (Nov 2023) — Iranian-linked CyberAv3ngers compromised internet-exposed Unitronics Vision Series PLCs at multiple U.S. water utilities, including Aliquippa, PA. Default passwords, no authentication
Colonial Pipeline (May 2021) — DarkSide ransomware shut down the largest fuel pipeline in the eastern U.S. for 6 days, causing widespread gas shortages
Oldsmar Water Plant (Feb 2021) — attacker accessed the SCADA system via TeamViewer and attempted to increase sodium hydroxide (lye) to dangerous levels
Sandworm / Ukraine power grid — Russian GRU caused multiple power outages in Ukraine using INDUSTROYER and CRASHOVERRIDE malware targeting ICS protocols

Why OT security is uniquely hard:

• Systems can’t be easily patched (24/7 operations, vendor approval required, legacy OS)
• Protocols (Modbus, DNP3, OPC) have no built-in authentication or encryption
• “Air gaps” rarely exist in practice — IT/OT convergence creates pathways
• Safety systems (SIS) may themselves be vulnerable to attack
• Incidents can cause physical harm: chemical releases, power outages, explosions

CISA has made OT/ICS security a top priority, releasing advisories and free assessment tools. But the fundamental problem remains: critical infrastructure is defended by underfunded teams using equipment that was never designed to be networked.

Zero-day exploit market with Zerodium NSO Group and government buyers
Threat Intel Ongoing

Zero-Day Brokers: Inside the Multi-Billion Dollar Exploit Market

A shadow industry trades in zero-day exploits — vulnerabilities unknown to vendors. Companies like Zerodium publicly offer up to $2.5 million for an iPhone zero-click chain. NSO Group sells Pegasus spyware to governments. The market operates in a legal gray zone between legitimate defense research and enabling authoritarian surveillance.

Read source

Every major government in the world buys zero-day exploits. The question is from whom, for how much, and what they do with them.

The exploit market tiers:

Bug bounty programs (Apple, Google, Microsoft) — $20K–$250K. The “legitimate” channel. Vendors fix the bug
Exploit brokers (Zerodium, Crowdfense, Operation Zero) — $100K–$2.5M. Buy exploits and resell to government clients. The bug stays unpatched
Offensive security firms (NSO Group, Intellexa, Candiru) — build turnkey surveillance products using exploit chains. Sell access as a service
Government CNE programs (NSA TAO, GCHQ, Unit 8200) — develop exploits internally and acquire from brokers

Current public pricing (Zerodium):

• iPhone zero-click full chain: $2,500,000
• Android zero-click full chain: $2,500,000
• Chrome RCE + sandbox escape: $500,000
• Windows zero-click RCE: $1,000,000
• Signal/WhatsApp RCE: $1,500,000

The NSO Group controversy: NSO Group’s Pegasus spyware was found on phones of journalists, human rights activists, and political dissidents across 50+ countries. The U.S. placed NSO on the Entity List (trade blacklist) in 2021. Apple and WhatsApp have sued NSO. Despite this, similar firms continue to operate with government contracts worldwide.

The exploit market creates a perverse incentive: the most valuable vulnerabilities are the ones that stay unpatched the longest. This puts exploit brokers in direct opposition to the security community’s goal of fixing bugs quickly.

Threat intelligence platforms MITRE ATT&CK VirusTotal Shodan Censys
OSINT Ongoing

Threat Intelligence Platforms: MITRE ATT&CK, VirusTotal, Shodan, and How Defenders Hunt

Modern cyber defense relies on a constellation of threat intelligence tools. MITRE ATT&CK maps adversary behavior. VirusTotal analyzes malware. Shodan and Censys index every internet-facing device. Together they form the defender’s toolkit for understanding and hunting threats.

Read source

Threat intelligence isn’t just “feeds of bad IPs.” It’s a discipline that combines data from multiple sources to understand who is attacking you, how they operate, and what you can do about it.

The essential platforms:

MITRE ATT&CK — a knowledge base of adversary tactics, techniques, and procedures (TTPs). Maps how real threat groups operate, from initial access through exfiltration. Used to build detection rules, assess gaps, and communicate about threats in a common language
VirusTotal — a malware analysis platform (owned by Google/Alphabet). Upload a file or hash to check it against 70+ antivirus engines. The intelligence layer (VT Intelligence) lets you hunt for malware campaigns, track infrastructure, and pivot between indicators
Shodan — a search engine for internet-connected devices. Indexes every public IP, identifying what software/hardware is running. Defenders use it to find their own exposed assets; researchers use it to measure vulnerable populations
Censys — similar to Shodan but with a focus on TLS certificates and cloud infrastructure. Excellent for mapping organizational attack surfaces
GreyNoise — differentiates between targeted attacks and background internet noise (mass scanners, botnets). Helps analysts focus on real threats

How defenders use these together:

Detection engineering: Map ATT&CK techniques to log sources, write detection rules for each technique
Threat hunting: Use ATT&CK to hypothesize where an adversary might be, then search logs for evidence
Incident response: Submit malware samples to VT, check C2 infrastructure on Shodan/Censys, map activity to known ATT&CK groups
Attack surface management: Continuously scan your own infrastructure with Shodan/Censys to find exposed services before attackers do

The democratization of threat intelligence has been one of the biggest improvements in cybersecurity over the past decade. Tools that were once available only to government agencies or large enterprises are now free or affordable for any defender.

Press / to search