Discover how to create your own custom Sigma rules to hunt for the latest threats that are affecting your environment and thwart threat actors.
Learn how to use threat intelligence articles, the MITRE ATT&CK framework, and Sigma rules to perform threat-informed hunting using Splunk queries.
Let's explore the MITRE ATT&CK framework and find out why it's a must know tool for any cyber threat intelligence analyst looking to tackle the latest threats.