In December 2024, we warned against the rapid evolution of adversary tactics, techniques, and procedures (TTPs) in 2025. Our predictions have come true, as cybercriminals leverage millions of dollars in profits to develop new malware technologies and support them with increasingly sophisticated procedures.
Those investments pay off. Security experts estimate that an average of 600+ new threat variants are released every day. This volume of activity is more than enough to overwhelm static detection systems and threat models based on indicators of compromise (IOCs).
This creates a situation where alerts and signatures are constantly catching up. By the time they do, adversaries have already moved on or escalated their techniques further. This leaves security operations centers (SOCs) overwhelmed, low on confidence, and scrambling to prove that existing controls still align with real-world threats.
For security leaders, prioritizing fast-moving threats and proving alignment between security controls and attacker behaviors remains a complex problem. The solution lies in mapping defenses to adversary behaviors, rather than relying on static IOCs.
New malware variants are only one part of this story. Attackers stay effective by changing their behaviors. Even fully patched environments remain vulnerable when adversaries adopt living-off-the-land techniques to exploit legitimate tools, credentials, and processes already present inside your organization.
For example, many threat actors still begin well-worn initial access attacks like phishing. But once inside, they pivot quickly to built-in administrative tools such as PowerShell, Windows Management Instrumentation (WMI), or cloud-native APIs.
These behaviors don’t rely on exploits at all, which means patching and perimeter defenses provide little protection. Instead, adversaries blend seamlessly with normal operations, making detection more complex and response more urgent.
This is where frameworks like MITRE ATT&CK are meant to help. Defenders use this information to map, track, and prioritize emerging behaviors. However, maintaining up-to-date mapping while attackers constantly refine their tactics remains a challenge. To guarantee effective security operations, SOC teams need insight into the latest attacker behaviors as they emerge.
Even well-equipped SOCs face structural challenges that prevent them from keeping pace with evolving adversary behaviors:
This puts security leaders in a challenging position. The SOC is caught in a cycle of firefighting without forward progress, unable to adapt as adversaries evolve.
Defending against rapidly evolving adversary TTPs requires more than faster patching or adding more alerts to an already noisy SOC. It calls for a new approach: Threat-Led Defense.
Threat-Led Defense puts adversary behavior at the center of your security strategy. It leverages frameworks like MITRE ATT&CK to go beyond the baseline of known attacker behaviors, with 14,000 known procedures and more than 2,500 sightings and clusters. Continuously mapping TTPs to your unique environment enables analysts to understand real-world adversary behavior and the techniques being employed as they emerge.
This shift dramatically improves your ability to measure SOC readiness, prioritize investments in new technologies, and communicate ROI with confidence. It provides accurate context into adversary behaviors and reduces SOC inefficiency across the board.
Defending against rapidly evolving adversary TTPs requires a shift in both mindset and operations. Transitioning from reactive IOC-chasing to a proactive, threat-led strategy doesn’t happen overnight, but there are clear steps you can take towards the Thread-Led approach:
Tidal Cyber is the first true Threat-Led Defense platform that flips the traditional defensive model by putting real adversary behavior at the center of your defense strategy. Threat-led defense moves beyond assumptions and CVE myopia. By mapping techniques, sub-techniques, and procedures to ATT&CK, Tidal Cyber reveals exactly where your defenses are exposed and how attackers actually operate.