Skip to content

We are excited to announce that the Tidal Cyber Enterprise and Community Editions are now on the new v18 version of MITRE ATT&CK®! 

With every new ATT&CK update, the Tidal Cyber team does the work of analyzing new content additions and, where relevant, merging and extending existing content in our platform so our users can enjoy a seamless and stress-free experience.

In just one day of this new release, the Tidal Cyber team did the heavy lifting to merge and extend any overlapping new MITRE objects, and went through the update to find that many of these objects already existed within the Tidal Cyber Knowledge Base, proving that we give our users early visibility into the threat landscape and the behaviors used by adversaries!

The MITRE ATT&CK team published 42 new Groups, Campaigns, and Software in this release. 28 of those objects overlapped with existing ones already available in the Tidal Cyber knowledge base – more than double the rate of overlaps seen in the v17 release. 

In the large majority of cases, we added and extended these new v18 objects with original threat metadata, Technique and other threat object relationships, and more than 400 Tidal Procedures as soon as they were released into the Tidal platform. We also reviewed all Tidal Cyber-curated Threat Profiles, and swapped any overlapping objects for the new, most up-to-date versions of the objects. 

The v18 release added 12 new Techniques and Sub-Techniques and updated many other Techniques, but there were no Technique deprecations or revocations. We assigned weightings for the 12 newly added v18 Techniques for users to immediately leverage in their Coverage Maps.

On the defensive side, the new ATT&CK analytic objects can now be found in Coverage Map Recommendations. These are 1,739 refined analytics from the ATT&CK Mitigations product, and we have updated the MITRE ATT&CK Mitigations in Tidal Cyber generally to align them with ATT&CK v18. 


 

 

Data-Driven Threat-Informed Defense

Meet Tidal Enterprise Edition

Quickly and easily develop custom threat profiles and defensive stacks, see your coverage and identify gaps and redundancies, and get daily recommendations to improve your cybersecurity posture.