{"id":2226,"date":"2023-05-30T16:01:34","date_gmt":"2023-05-30T14:01:34","guid":{"rendered":"https:\/\/www.spacesecurity.info\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/"},"modified":"2023-11-03T09:45:15","modified_gmt":"2023-11-03T08:45:15","slug":"attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/","title":{"rendered":"ATT&#038;CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, &#8230;"},"content":{"rendered":"<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2219\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13-1024x730.jpeg\" alt=\"\" width=\"696\" height=\"496\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13-1024x730.jpeg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13-300x214.jpeg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13-768x547.jpeg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13-696x496.jpeg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13-1068x761.jpeg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13-100x70.jpeg 100w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13.jpeg 1200w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>\ud83d\udd25 On Tuesday 25 April 2023, the MITRE Corporation released ATT&amp;CK v13, the new version of its framework.<\/p>\n<p>This new version includes significant updates and affects all matrices: Enterprise, Mobile and ICS.<\/p>\n<p>In this article, we summarize the biggest changes\u00a0: and will go through more details.<\/p>\n<p>\u2714\ufe0f Addition of &#8220;Pseudocode analytics for Detection&#8221;: I understand this is the most important change in ATT&amp;CK v13. It adds detailed recommendations to the TTPs in the Enterprise matrix to improve their detection by providing more precision and context on what to look for and collect. This new information can be consulted in the CAR (Cyber Analytics Repository) database.<\/p>\n<p>\u2714\ufe0f\u00a0Addition of new data sources for the Mobile matrix: Data sources represent information that can be collected from logs or probes. They also include characteristics that make it possible to identify the specific properties\/values of a data source that are relevant to the detection of a technique or sub-technique.<\/p>\n<p>\u2714\ufe0f\u00a0Update of the ICS matrix: overhaul of assets, addition of new techniques and refresh of campaign mapping<\/p>\n<p>\u2714\ufe0f\u00a0Update of APT groups and attack campaigns with the possibility of cross-domain mapping<\/p>\n<p>\u2714\ufe0f\u00a0Improved coverage of the Cloud: addition of new technologies and completion of execution and lateral movement techniques<\/p>\n<p>\u2714\ufe0f\u00a0Improved coverage of Linux: updated techniques and sub-techniques with a better understanding of attacks<\/p>\n<p>\u2714\ufe0f\u00a0Improvements to the web interface, mainly in the search module<\/p>\n<p>\u2714\ufe0f\u00a0New changelog types to help identify more precisely what has changed in ATT&amp;CK.<\/p>\n<blockquote><p>\u201cwe\u2019re working toward enhanced tools for lower-resourced defenders, improving ATT&amp;CK\u2019s website usability, enhancing ICS and Mobile parity with Enterprise, and evolving overall content and structure this year\u201d<\/p><\/blockquote>\n<p style=\"text-align: right;\">Amy L. Robertson<\/p>\n<p>\ud83e\udd29 A v14 is already announced for October with more details at ATT&amp;CKCon 4.0 which takes place on 24-25 October 2023 :<\/p>\n<ul>\n<li>upgraded coverage across domains<\/li>\n<li>renovated mitigations<\/li>\n<li>new cross-domain mappings<\/li>\n<li>more pseudocodes<\/li>\n<li>mobile structured detections<\/li>\n<\/ul>\n<p>\ud83d\udc49 More details in this article on the <a href=\"https:\/\/medium.com\/mitre-attack\/attack-v13-enters-the-room-5cef174c32ff\">MITRE blog<\/a><\/p>\n<p><strong>More about MITRE ATT&amp;CK framework<\/strong><\/p>\n<p>The MITRE ATT&amp;CK framework is a globally recognized knowledge base and methodology for understanding, organizing, and classifying cyber threats and tactics used by adversaries during different stages of a cyber attack. ATT&amp;CK stands for Adversarial Tactics, Techniques, and Common Knowledge.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2223\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-1024x683.png\" alt=\"\" width=\"696\" height=\"464\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-1024x683.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-300x200.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-768x512.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-1536x1024.png 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-2048x1366.png 2048w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-696x464.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-1068x712.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-ATTCK-1920x1280.png 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>The framework was developed by MITRE, a not-for-profit organization that operates federally funded research and development centers (FFRDCs) to address various challenges faced by the U.S. government. However, the framework has gained widespread adoption in the cybersecurity community and is used by organizations around the world.<\/p>\n<p>The MITRE ATT&amp;CK framework provides a comprehensive model that describes the entire lifecycle of a cyber attack, from initial reconnaissance and weaponization to lateral movement, data exfiltration, and impact. It consists of a matrix that outlines various tactics and techniques employed by adversaries, along with information on the platforms they target (e.g., Windows, macOS, Linux) and the types of software they use.<\/p>\n<p>The framework is organized into several categories, including Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Exfiltration, and Impact. Each category is further divided into specific techniques and sub-techniques that adversaries may employ.<\/p>\n<p>For each technique, the framework provides detailed information on how it works, the potential impact, and real-world examples of its usage by known threat actors. This knowledge base allows organizations to better understand the tactics and techniques employed by adversaries and assists in building effective defensive strategies and improving incident response capabilities.<\/p>\n<p>By utilizing the MITRE ATT&amp;CK framework, organizations can map observed adversary behaviors to specific techniques, identify security gaps, prioritize defenses, develop threat intelligence, and share information with the broader cybersecurity community. The framework serves as a common language and reference point for cybersecurity professionals, enabling them to collaborate and exchange knowledge on emerging threats and effective defense strategies.<\/p>\n<p>Overall, the MITRE ATT&amp;CK framework plays a crucial role in enhancing cybersecurity awareness and readiness, facilitating the development of proactive defense measures, and improving the overall resilience of organizations against cyber attacks.<\/p>\n<p>Go to the MITRE ATT&amp;CK framework <a href=\"https:\/\/attack.mitre.org\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd25 On Tuesday 25 April 2023, the MITRE Corporation released ATT&amp;CK v13, the new version of its framework. This new version includes significant updates and affects all matrices: Enterprise, Mobile and ICS. In this article, we summarize the biggest changes\u00a0: and will go through more details. \u2714\ufe0f Addition of &#8220;Pseudocode analytics for Detection&#8221;: I understand [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2220,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,20,19],"tags":[],"class_list":{"0":"post-2226","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-news","9":"category-united-states"},"a3_pvc":{"activated":false,"total_views":0,"today_views":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ATT&amp;CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, ... - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ATT&amp;CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, ... - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"\ud83d\udd25 On Tuesday 25 April 2023, the MITRE Corporation released ATT&amp;CK v13, the new version of its framework. This new version includes significant updates and affects all matrices: Enterprise, Mobile and ICS. In this article, we summarize the biggest changes\u00a0: and will go through more details. \u2714\ufe0f Addition of &#8220;Pseudocode analytics for Detection&#8221;: I understand [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-30T14:01:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-03T08:45:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"855\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"ATT&#038;CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, &#8230;\",\"datePublished\":\"2023-05-30T14:01:34+00:00\",\"dateModified\":\"2023-11-03T08:45:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/\"},\"wordCount\":692,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/MITRE-V13.jpeg\",\"articleSection\":[\"Cyber\",\"News\",\"United-States\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/\",\"name\":\"ATT&CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, ... - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/MITRE-V13.jpeg\",\"datePublished\":\"2023-05-30T14:01:34+00:00\",\"dateModified\":\"2023-11-03T08:45:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/MITRE-V13.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/MITRE-V13.jpeg\",\"width\":1200,\"height\":855},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ATT&#038;CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, &#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ATT&CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, ... - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/","og_locale":"en_US","og_type":"article","og_title":"ATT&CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, ... - Space &amp; Cybersecurity Info","og_description":"\ud83d\udd25 On Tuesday 25 April 2023, the MITRE Corporation released ATT&amp;CK v13, the new version of its framework. This new version includes significant updates and affects all matrices: Enterprise, Mobile and ICS. In this article, we summarize the biggest changes\u00a0: and will go through more details. \u2714\ufe0f Addition of &#8220;Pseudocode analytics for Detection&#8221;: I understand [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2023-05-30T14:01:34+00:00","article_modified_time":"2023-11-03T08:45:15+00:00","og_image":[{"width":1200,"height":855,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13.jpeg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"ATT&#038;CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, &#8230;","datePublished":"2023-05-30T14:01:34+00:00","dateModified":"2023-11-03T08:45:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/"},"wordCount":692,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13.jpeg","articleSection":["Cyber","News","United-States"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/","url":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/","name":"ATT&CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, ... - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13.jpeg","datePublished":"2023-05-30T14:01:34+00:00","dateModified":"2023-11-03T08:45:15+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13.jpeg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/MITRE-V13.jpeg","width":1200,"height":855},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/attck-v13-released-with-significant-updates-pseudocode-swifter-search-mobile-data-sources-and-ics-asset-refactoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"ATT&#038;CK v13 released with significant updates : Pseudocode, Swifter Search, Mobile Data Sources and ICS asset refactoring, &#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2226"}],"version-history":[{"count":1,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2226\/revisions"}],"predecessor-version":[{"id":2512,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2226\/revisions\/2512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/2220"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}