2025-05-06 22:06:35
The MITRE ATT&CK Framework defines 13 techniques within the Impact category. These techniques describe how adversaries can disrupt the availability, integrity, or confidentiality of systems and data. Below is a desc...
2023-04-20 22:50:07
The Mitre Att&ck Framework has defined nine techniques in the Exfiltration category.
The Automated Exfiltration technique is when the malware that the threat actor used to compromise the target is programmed to a...
2023-04-18 00:21:01
The Mitre Att&ck Matrix has 16 techniques in the Command and Control Category.
Application Layer Protocol is when a command and control system utilizes an application layer protocol such as DNS or HTTP to attempt...
2023-04-12 01:30:43
The Mitre Att&ck Matrix has defined 17 techniques for the Collection Category.
Adversary-In-The-Middle is when a threat actor redirects traffic from a target to the threat actor so the threat actor can collect da...
2023-04-11 00:47:38
Mitre Att&ck Matrix has defined nine techniques to cover Lateral Movement. Lateral Movement is tied three ways, in terms of being the second least complicated category.
Exploitation of Remote Services is when a t...
2023-04-08 02:05:52
The Mitre Att&ck Matrix has set 30 Techniques in the Discovery category. Discovery is Mitre Att&ck Matrix’s second most complex category. These are generally steps taken to enumerate the target the threat acto...
2023-04-04 01:06:21
The Mitre Att&ck Matrix has defined 17 sub-techniques to define the Credential Access Technique.
Adversary-in-the-Middle is when a threat actor intercepts traffic from a target to capture or manipulate before sen...
2023-04-01 21:28:43
The Mitre Att&ck Matrix’s most complex technique is Defense Evasion. Mitre has defined a whopping 42 sub-techniques to cover the Defense Evasion technique!
Abuse Elevation Control Mechanism is when a threat act...
2023-03-27 01:31:14
The Mitre Att&ck Matrix has defined 13 techniques for Privilege Escalation.
Abuse Elevation Control Mechanism is when a threat actor utilizes a flaw in a mechanic used to elevate privileges to grant privileges. E...
2023-03-26 00:53:20
The Mitre Att&ck Matrix has defined 19 techniques under the Persistence category.
Account Manipulation is when a threat actor modifies an existing account to maintain access. Be it from credentials to permissions...