Loading theme toggle...

THREAT HUNTING

MITRE ATT&CK Analytics

Technique-level hunting coverage, trend shifts, and high-priority detections in one unified workflow.

5 critical techniques are active

Critical techniques should be prioritized for rule tuning and hunt task allocation.

7 techniques are trending up

Use trend filters and date range controls to focus on fast-changing behavior.

TOTAL DETECTIONS

1,211

Across mapped techniques

CRITICAL TECHNIQUES

5

Priority triage

TRENDING UP

7

Potential escalation

AVG COVERAGE

77%

Tactic coverage baseline

TECHNIQUE INVENTORY

IDTechniqueTacticDetectionsSeverityTrendLast Seen
T1566PhishingInitial Access89HIGH2h ago
T1059Command and Scripting InterpreterExecution234CRITICAL15m ago
T1078Valid AccountsPersistence156HIGH1h ago
T1068Exploitation for Privilege EscalationPrivilege Escalation34CRITICAL30m ago
T1027Obfuscated Files or InformationDefense Evasion178MEDIUM3h ago
Total 11 · Page 1 of 3

TACTIC COVERAGE

Initial Access78%
Execution91%
Persistence82%
Privilege Escalation71%
Defense Evasion58%
Credential Access85%
Lateral Movement74%
Exfiltration67%
Impact88%

TOP DETECTIONS

T1083

File and Directory Discovery

245

T1059

Command and Scripting Interpre...

234

T1027

Obfuscated Files or Informatio...

178

T1078

Valid Accounts

156

T1021

Remote Services

123