00899nas a2200145 4500000000100000008004100001260001500042100002300057700002700080700002000107245014800127856004700275520041700322022001400739 2023 d c2023-03-021 aMd Rayhanur Rahman1 aRezvan Mahdavi Hezaveh1 aLaurie Williams00aWhat Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey uhttps://dl.acm.org/doi/abs/10.1145/35717263 aCybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles describing cyberattack strategies, procedures, and tools. The goal of this article is to aid cybersecurity researchers in understanding the current techniques used for cyberthreat intelligence extraction from text through a survey of relevant studies in the literature. a0360-0300