Description: A comprehensive, living knowledge base of adversary tactics and techniques. In 2026, it is used to map observed attacker behavior during an incident to known threat actor groups and remediation playbooks.
Subcategory: Standards & Frameworks
License: free