DirectDefense mapped alerts to the MITRE ATT&CK® framework to identify the top five tactics. The top five tactics identified are: Initial Access, Persistence, Lateral Movement, Execution, and Credential Access.
DirectDefense mapped alerts to the MITRE ATT&CK® framework to identify the top five tactics. The top five tactics identified are: Initial Access, Persistence, Lateral Movement, Execution, and Credential Access. — This cybersecurity statistic was published by DirectDefense in April 2025. It covers topics including MITRE ATT&CK, Initial access, Persistence, Lateral movement, Execution. The original data appears in 2025 Security Operations Threat Report. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
DirectDefense mapped alerts to the MITRE ATT&CK® framework to identify the top five tactics. The top five tactics identified are: Initial Access, Persistence, Lateral Movement, Execution, and Credential Access. This data was published by DirectDefense and covers MITRE ATT&CK, Initial access, Persistence, Lateral movement, Execution.
Where does this data come from?
This statistic comes from 2025 Security Operations Threat Report, published by DirectDefense on April 15, 2025. You can view the original report at https://www.directdefense.com/gain-clarity/threat-report/.
What cybersecurity topics does this cover?
This statistic relates to MITRE ATT&CK, Initial access, Persistence, Lateral movement, Execution. Browse more statistics on MITRE ATT&CK or from DirectDefense.