Explore the concept of generating MITRE ATT&CK DNA for groups of actors in this informative 36-minute conference talk by Sergey Polzunov from Cooper. Delve into the hypothesis, algorithm, and hitmap behind this approach, and learn about term frequency analysis. Examine use cases, including threat actor groups emulating each other, and discuss challenges faced in the process. Discover available resources, the potential for a centralized repository, and ways the community can contribute. Gain insights into the application of natural language processing in this field, with a specific focus on China-related threat actors.