









When we published the Elastic Global Threat Report in 2022, it included threat trends and correlations from our analysis of telemetry data shared by our users. In addition to telling us about how well features work for them, it also represents our visibility of the threat landscape.
About 34% of the techniques we saw were related to defense evasion, which we believe is a direct result of e