MITRE has hundreds of techniques. Some are old classics. Some are getting abused more than ever.
Which one catches your attention right now?
Maybe it’s:
- T1059 – Command & Scripting Interpreter. Attackers keep using PowerShell and CMD because defenders still miss the context.
- T1027 – Obfuscated/Encrypted Files & Info. Everything is encrypted now, even malware payloads.
- T1071 – Application Layer Protocol. C2 over HTTPS blends in too well.
- T1566 – Phishing. Still the easiest way into most environments.
- T1110 – Brute Force. Password spraying is non-stop, especially on cloud apps.
- T1047 – WMI Execution. Quiet, powerful, and still under-monitored.
Drop the technique you think deserves more attention and why.
Teach the community something others are overlooking.