CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques

Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has emerged as a means to prevent and fight cybercrime.Attempts already exist in this regard.The Common Vulnerabilities and Exposures (CVE) list documents numerous reported software and hardware vulne

read more