Hi!
Could someone explain:
1.How frameworks like MITRE ATT&CK are used to track attacker techniques?
2.How OSINT or SOCMINT is used when monitoring threat actors online?
3.What ethical boundaries researchers usually follow when doing HUMINT investigations?