Frequently Asked Questions

MITRE ATT&CK v18 Framework

What are the major changes introduced in MITRE ATT&CK v18?

MITRE ATT&CK v18 replaces traditional Detections (Data Sources) with Detection Strategies and Analytics, creating a behavior-driven model that enhances visibility and cross-tactic correlation. This update enables defenders to align detections more closely with real-world adversary behaviors and operational defense needs. (Source: MITRE ATT&CK v18: Detection Redefined, Dec 17, 2025)

How do Detection Strategies and Analytics improve upon the previous Data Sources model?

Detection Strategies and Analytics provide structured, actionable guidance by linking analytics to telemetry, allowing defenders to understand how and where adversarial behaviors appear. This bridges the gap between intelligence and operational defense, making detections more precise and aligned with real-world threats. (Source: MITRE ATT&CK v18: Detection Redefined)

What are Data Components in MITRE ATT&CK v18 and why are they important?

Data Components in MITRE ATT&CK v18 are granular elements that connect telemetry sources (like process creation or registry access) to Detection Strategies. This redefinition supports more precise mapping between data sources and adversary techniques, enhancing detection engineering. (Source: MITRE ATT&CK v18: Detection Redefined)

How does MITRE ATT&CK v18 help with cross-tactic detection and correlation?

By focusing on behavior-driven detection strategies and analytics, MITRE ATT&CK v18 strengthens cross-tactic correlations, especially in areas like Execution and Persistence, where overlapping telemetry can challenge SOC teams. This helps defenders identify not just what to detect, but how and where adversarial behaviors manifest. (Source: MITRE ATT&CK v18: Detection Redefined)

What are some examples of new techniques added in MITRE ATT&CK v18?

MITRE ATT&CK v18 introduces 12 new techniques, further expanding the framework's coverage of adversary behaviors. For a detailed list, refer to the official MITRE update: MITRE ATT&CK v18 New Techniques.

How does MITRE ATT&CK v18 impact detection engineering teams?

The new model provides more actionable, behavior-based guidance, enabling detection engineering teams to design logic that mirrors adversarial TTPs and aligns with real-world threats. This supports more effective and measurable detection resilience. (Source: MITRE ATT&CK v18: Detection Redefined)

What is the future roadmap for MITRE ATT&CK beyond v18?

MITRE plans to split the "Defense Evasion" tactic into "Stealth" and "Impair Defenses," update detections to match the new model, expand CTI content, broaden asset coverage, refine techniques, and launch the ATT&CK Advisory Council for structured community feedback. (Source: MITRE ATT&CK v18: Detection Redefined)

Where can I learn more about MITRE ATT&CK v18 and its implications?

You can watch the video "MITRE ATT&CK Version 18 Explained" and read the guide "Build, Validate and Optimize Threat Detections" on the Cymulate resources page: Cymulate Resources.

Cymulate Platform & MITRE ATT&CK Integration

How does Cymulate align with MITRE ATT&CK v18?

Cymulate is fully mapped to MITRE ATT&CK, continuously validating detections and auto-generating vendor-specific SIGMA and EDR rules. The platform's attack simulation tests are integrated and mapped to MITRE ATT&CK techniques, sub-techniques, mitigations, and detections, ensuring measurable detection resilience. (Source: MITRE ATT&CK v18: Detection Redefined)

How does Cymulate operationalize MITRE ATT&CK Detection Strategies?

Cymulate simulates MITRE ATT&CK techniques and auto-generates SIGMA rules for missed attack tests, providing tangible validation layers. This ensures detection engineering keeps pace with ATT&CK’s evolving taxonomy and that the right detections are in place. (Source: MITRE ATT&CK v18: Detection Redefined)

Can Cymulate validate if my EDR is properly configured for MITRE ATT&CK techniques?

Yes, Cymulate runs attack tests mapped to MITRE ATT&CK techniques (e.g., T1552.002 – Credentials in Registry) to validate if your EDR is configured to detect malicious activity. It confirms the presence of relevant log sources and provides auto-generated detection rules. (Source: MITRE ATT&CK v18: Detection Redefined)

How does Cymulate help with detection engineering automation?

Cymulate accelerates detection engineering by automatically generating vendor-specific detection rules, including EDR and SIGMA-based rules, for missed attack tests. It also provides MITRE ATT&CK recommended mitigations, streamlining the process for security teams. (Source: MITRE ATT&CK v18: Detection Redefined)

What is an example of a Cymulate attack simulation mapped to MITRE ATT&CK?

For technique T1552.002 (Credentials in Registry), Cymulate runs attack tests that attempt to query registries for stored credentials. It validates if the EDR captures this activity and auto-generates SIGMA rules for detection, ensuring alignment with MITRE ATT&CK. (Source: MITRE ATT&CK v18: Detection Redefined)

How does Cymulate keep up with changes in the MITRE ATT&CK framework?

Cymulate continuously updates its platform to align with the latest MITRE ATT&CK framework changes, ensuring that attack simulations, detection engineering, and mitigation mapping reflect the most current standards. (Source: MITRE ATT&CK v18: Detection Redefined)

Features & Capabilities

What are the key features of the Cymulate platform?

Cymulate offers continuous threat validation, a unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics, attack path discovery, automated mitigation, AI-powered optimization, and an extensive threat library with over 100,000 attack actions updated daily. (Source: Cymulate Platform)

How does Cymulate help organizations improve their security posture?

Cymulate enables organizations to achieve up to a 52% reduction in critical exposures, a 20-point improvement in threat prevention, and an 81% reduction in cyber risk within four months, by continuously validating defenses and prioritizing remediation. (Source: Optimize Threat Resilience)

Does Cymulate support automated mitigation and detection rule generation?

Yes, Cymulate integrates with security controls to push updates for immediate threat prevention and auto-generates vendor-specific detection rules, including SIGMA and EDR rules, for missed attack tests. (Source: MITRE ATT&CK v18: Detection Redefined)

How does Cymulate's threat library support detection engineering?

Cymulate provides an advanced library of over 100,000 attack actions aligned to MITRE ATT&CK, updated daily, enabling organizations to test and validate their defenses against the latest threats. (Source: Cymulate Platform)

Implementation & Ease of Use

How easy is it to implement Cymulate and start using it?

Cymulate is designed for quick, agentless deployment with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately, with support available via email, chat, and a comprehensive knowledge base. (Source: Knowledge Base)

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and actionable insights. Testimonials highlight its simplicity, quick implementation, and effective support. (Source: Customer Quotes)

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. (Source: Security at Cymulate)

How does Cymulate ensure data security and privacy?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC) with regular vulnerability scanning and third-party penetration testing. (Source: Security at Cymulate)

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, and more. (Source: CISO/CIO, SecOps, Red Teaming, Vulnerability Management)

What business impact can organizations expect from Cymulate?

Organizations can expect improved security posture, up to 60% increase in team efficiency, 40X faster threat validation, cost savings through tool consolidation, and enhanced threat resilience. (Source: Optimize Threat Resilience)

Are there case studies showing Cymulate's effectiveness?

Yes, for example, Hertz Israel reduced cyber risk by 81% in four months using Cymulate. More case studies are available on the Cymulate Customers page.

Integrations & Partnerships

What integrations does Cymulate offer?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a full list, visit the Partnerships and Integrations page.

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs, based on the chosen package, number of assets, and scenarios. For a detailed quote, you can schedule a demo with the Cymulate team. (Source: Knowledge Base)

Resources & Support

Where can I find Cymulate's blog and latest research?

You can read about the latest threats, research, and product updates on the Cymulate Blog.

Where can I find Cymulate's newsroom and event information?

For media mentions, press releases, and event information, visit the Cymulate Newsroom and Events & Webinars page.

Is there a central resource hub for Cymulate insights and product information?

Yes, the Cymulate Resource Hub contains insights, thought leadership, and product information.

Does Cymulate provide educational content on detection engineering and MITRE ATT&CK?

Yes, Cymulate offers guides, solution briefs, and videos on detection engineering and MITRE ATT&CK, available in the Resource Hub.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

MITRE ATT&CK v18: New Detection Strategies and Analytics Redefine Cyber Defense

By: Amanda Kegley

Last Updated: December 17, 2025

The latest release of the MITRE ATT&CK Framework v18.0 marks a significant change in how the cybersecurity community conceptualizes and documents detections. Effective Oct. 28, 2025, all MITRE ATT&CK framework detections are now updated for each technique and sub-technique by removing traditional Detections (Data Sources) and replacing with Detection Strategies and Analytics. Data Sources have been fully retired.  

This transitions static detections to structured Detection Strategies and Analytics marking a major evolution in how ATT&CK aligns with real-world adversary behaviors. Not only is visibility enhanced across tactics, but also cross-tactic correlations are strengthened. This is especially the case between Execution and Persistence, where overlapping telemetry often challenges SOC teams in maintaining detection precision. 

Key highlights 

  • MITRE ATT&CK Framework v18 transforms detections: The latest update replaces traditional Detections (Data Sources) with Detection Strategies and Analytics, creating a behavior-driven model that strengthens visibility and cross-tactic correlation. 
  • Analytics makes detections actionable: By linking analytics to telemetry, defenders can now understand how and where adversarial behaviors appear, bridging the gap between intelligence and operational defense. 
  • Data Components redefined for precision: The new structure enhances the connection between telemetry and adversary techniques, enabling more granular detection engineering aligned with real-world threat behaviors. 
  • Cymulate operationalizes MITRE v18: Fully mapped to MITRE ATT@CK, Cymulate continuously validates detections and auto-generates vendor-specific SIGMA and EDR rules, turning MITRE’s Detection Strategies into measurable, tested detection resilience.
  • New Techniques12 new techniques have been added to the MITRE ATT&CK v18 Framework. 

What’s new in the MITRE ATT&CK v18 Framework 

From extensive feedback, the user community has just received a long-awaited change to the MITRE ATT&CK framework. The detection model that has been in place for 10 years has been re-hauled to add realistic layers for behavior-based detection strategies and analytics vs. just data sources. This allows organizations to better align detections with real-world adversary behavior, improving detection accuracy and operational defense effectiveness. 

Detection strategies and analytics replace detections 

With MITRE’s revamped detection model, the detection mapping for each technique has been updated. Since the introduction of the ATT&CK framework in 2015, each technique detection has been mapped to one or more Data Sources and Data Components. With this new change, each technique detection maps to one or more Detection Strategies and Analytics, as shown below. 

New detection model mapping

The new detection model mapping includes: 

  • Structured fields such as detection name, description, detection analytics and relevant data sources 
  • Mappings to data components that highlight where detection telemetry originates (e.g., process creation, registry access, file modification) 
  • Behavior-driven focus, improving how detection teams align monitoring capabilities to real-world threats 

Impact: Defenders can now identify not just what to detect, but how and where adversarial behaviors manifest within telemetry. 

Data components redefined 

Data Components, the foundation of the MITRE ATT&CK detection layer, now provides clearer links between telemetry and Detection Strategies. This overhaul supports more granular mapping between data sources (e.g., endpoint logs, process monitoring) and adversary techniques. 

Introducing analytics for Detections 

The introduction of analytics effectively operationalizes the MITRE ATT&CK framework, shifting it from descriptive to actionable. By linking analytics to telemetry-driven detections, defenders can now design detection logic that mirrors adversarial TTPs. This aligns strongly with Cymulate continuous validation approach, ensuring that analytics not only exist in theory but are validated against real, emulated attack behaviors. 

Why MITRE ATT&CK v18 changes matter 

These updates transform the MITRE ATT&CK framework into a behaviorally-grounded defense model. By shifting to Detection Strategies and Analytics, defenders gain clarity on: 

  • How adversaries move laterally through systems and networks 
  • What telemetry sources reveal those movements 
  • How to align SOC detection engineering with adversary tradecraft 

In essence, MITRE is moving away from describing detections to defining how detections can be achieved, bridging the gap between intelligence and operational defense. 

Example of new ATT&CK detection model for techniques 

The table below describes the new detection model for each technique and sub-technique across all ATT&CK tactics. 

MITRE Detection Layer ATT&CK Framework v18 Example 
Technique/Sub-technique T15502.02 – Credentials in Registry 
(Tactic: Credential Access) 
Detection Strategy DET0250 – Detect registry queries for stored credentials 
Analytic AN0694 - Behavioral detection of registry queries by suspicious processes 
Data Components DC0032 – Process Creation (Event log) 
DC0063 – Windows Registry Key Modification (Event log) 
DC0050 – Windows Registry Key Access (EDR rule) 

New detection model for techniques 

Cymulate Platform and integration with MITRE ATT&CK 

The Cymulate platform continues to stay aligned to the evolving MITRE ATT&CK framework. The platform has over 90,000 attack simulation tests to validate your configured security controls. Each attack test is integrated and mapped to the MITRE ATT&CK framework for the corresponding technique and sub-techniques, mitigations and detections.  

Cymulate accelerates detection engineering for organizations by automatically generating vendor-specific detection rules, which includes EDR and SIGMA-based detections rules for missed attack tests. The platform also provides the MITRE ATT&CK recommended mitigations. 

This integration perfectly embodies the intent behind MITRE v18’s Detection Strategies. As Data Components are now more granular, Cymulate simulates techniques like T1552.002 – Credentials in Registry and auto-generate SIGMA rules, which provides tangible validation layers. It ensures that detection engineering keeps pace with ATT&CK’s evolving taxonomy, turning framework alignment into measurable detection resilience. Cymulate is fully aligned with this ATT&CK framework shift and continuously running attack simulations validates that the right detections are in place. 

Cymulate in Action: Example MITRE ATT&CK technique simulation 

For the example technique, T1552.002 - Credentials in Registry, the Cymulate platform has numerous attack tests that attempt to query registries for stored credentials to validate if the EDR is properly configured to capture this malicious activity, specifically to confirm the presence of the EDR:hunting log source (as illustrated above).  

Below is one of the example attack tests Cymulate has in its library for this specific technique.  

Scenario description and mapping to MITRE ATT&CK technique T1552.002 

General mapping to MITRE ATT&CK detections (current model v17.1) 

The picture above depicts the traditional detection mapping model currently in the Cymulate platform. Cymulate will be updating the detections for each attack tests with the new model. 

Once attack scenarios have been run, Cymulate delivers a status of detected or not detected. Cymulate automatically depicts the mitigations, which include detection rules that can be customized for your specific vendor security technology. 

Attack test simulation result & available auto-generated rules 

For this specific rule, Cymulate automatically generated this SIGMA rule to specifically detect this activity. 

Detection rule with event code including 4656 and 4657 aligned to MITRE ATT&CK log sources. 

Log source for data component

Ensuring security controls are continually detecting this malicious activity improves overall threat resilience to prevent and/or minimize security breaches.  

What’s next for MITRE ATT&CK Framework 

MITRE is already preparing for the next evolution of ATT&CK, as described in their recent blog post. The organization has indicated another milestone change by splitting the “Defense Evasion” tactic into two new tactics: 

  • Stealth 
  • Impair Defenses 

While this change is still in development, it reflects MITRE’s ongoing effort to capture adversary intent with greater precision. In addition, it plans on moving existing techniques to the appropriate tactic that did not quite fit into Defense Evasion, such as T1548 - Abuse Control Mechanism (move to Privileged Escalation) and T1578.005 - Modify Cloud Compute Configurations (move to Persistence). 

Moving into 2026, MITRE’s roadmap includes: 

  • Updating detections to match the detection strategies model. 
  • Expanding cyber threat intelligence (CTI) content, including new software, groups and cross-domain campaigns. 
  • Broadening asset coverage into more sectors and system types. 
  • Refining and recategorizing techniques 
  • Introducing additional sub-techniques. 
  • Launching the ATT&CK Advisory Council, a new body for structured community feedback on framework evolution and strategic direction. 

Operationalizing MITRE ATT&CK v18 with Cymulate

As MITRE ATT&CK continues to evolve, Cymulate is actively updating our platform to ensure that our attack simulation, detection engineering and mitigation mapping are fully aligned with MITRE ATT&CK v18 and beyond. 

Our commitment is clear. Cymulate customers will benefit from industry-standard mitigation and detection mapping, behaviorally aligned analytics and comprehensive coverage of ATT&CK techniques. By keeping pace with MITRE’s evolution, Cymulate empowers organizations to transform framework awareness into operational threat resilience. 

Want to see Cymulate in action to learn about the platform and how it’s aligned to the MITRE ATT&CK framework? Sign up for a demo and see what the platform can do for you. 

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo