<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>CTI on Riskitera Blog</title><link>https://blog.riskitera.com/en/categories/cti/</link><description>Recent content in CTI on Riskitera Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 30 Apr 2026 11:50:10 +0200</lastBuildDate><atom:link href="https://blog.riskitera.com/en/categories/cti/index.xml" rel="self" type="application/rss+xml"/><item><title>Threat Hunting: How to Hunt Threats Before They Strike</title><link>https://blog.riskitera.com/en/posts/2026/04/threat-hunting-practical-guide/</link><pubDate>Fri, 24 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.riskitera.com/en/posts/2026/04/threat-hunting-practical-guide/</guid><description>&lt;p>Threat hunting is the discipline of actively searching for signs of malicious activity across an organization&amp;rsquo;s systems and networks without waiting for an automated alert to flag it. In an environment where the average dwell time of an attacker inside a compromised network exceeds 200 days according to multiple industry studies, the ability to detect threats before they cause real damage has become a critical differentiator. This guide covers what threat hunting is, what methodologies exist, what tools are required, and how to build an effective program from scratch.&lt;/p></description></item><item><title>IOCs in Cybersecurity: What They Are and How to Use Them Effectively</title><link>https://blog.riskitera.com/en/posts/2026/04/iocs-in-cybersecurity-explained/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.riskitera.com/en/posts/2026/04/iocs-in-cybersecurity-explained/</guid><description>&lt;p>Indicators of Compromise (IOCs) are one of the most fundamental tools in cybersecurity incident detection and response. In a landscape where the average cost of a data breach reached $4.45 million in 2023 according to IBM, having up-to-date IOCs and knowing how to use them can mean the difference between detecting an attack in minutes or discovering it months later. This comprehensive guide explains what IOCs are, what types exist, where to obtain them, and how to integrate them effectively into your organization&amp;rsquo;s security operations.&lt;/p></description></item><item><title>MITRE ATT&amp;CK: What It Is and How to Use It in Your Organization</title><link>https://blog.riskitera.com/en/posts/2026/04/mitre-attack-framework-guide/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.riskitera.com/en/posts/2026/04/mitre-attack-framework-guide/</guid><description>&lt;p>&lt;a href="https://attack.mitre.org/">MITRE ATT&amp;amp;CK&lt;/a> has become the global standard for understanding, classifying, and communicating the tactics and techniques used by adversaries in real-world cyberattacks. Maintained by MITRE Corporation, this open knowledge base documents the behavior of over 140 threat groups and catalogs hundreds of techniques observed in actual incidents. For any organization aiming for a mature security posture, learning and applying MITRE ATT&amp;amp;CK is not optional: it is an operational necessity.&lt;/p></description></item></channel></rss>