Choose one of the following starting points to instantly build your threat model based on a unique, extensive collection of adversary TTP intelligence. View a tutorial of this feature here
Categorized Threats (Motive, Location, Industry)
Choose one or multiple criteria, then select a single adversary or threat category from the right-hand menu. Selecting multiple criteria will narrow your search (usually desired).
Lookup by adversary motive
Lookup by victim industry (scroll for more)
Lookup by adversary or victim location
Adversary Base
Victim Location (Scroll for more)
Select an entire threat category:
OR
Recent Intelligence
View the full library of recent adversary TTP intelligence heatmaps and source content.
Consider using this handy script to easily generate TTP heatmap files from open-source intel reports!
Threat Model for:
Visit the Risk workflow page to fully realize the value of adversary TTP intelligence by aligning your threat model with relevant defensive controls.