Note: This blog is part of a series of articles related to the use of Structured Analytic Techniques in Cyber Threat Intelligence (CTI). Previous examples include our Analysis of Competing Hypotheses (ACH) for REvil, a Cone of Plausibility exercise for ransomware development, and a Team A vs Team B exercise to study Lapsus$. Last week, […]