Characterize threat events by the typical attackers, the likely infection vectors, and the techniques and procedures that adversaries employ.
Our unique understanding of adversaries and their tactics is derived from fusing information gathered at incident response investigations, technical observations, and open sources.