MOST VISITED

The most visited techniques and threat actors
SSH Hijacking
SSH Hijacking

Adversaries may hijack a legitimate user's SSH session to move laterally within an environment. S...

keyboard_arrow_right
Exploit Public-Facing Application
Exploit Public-Facing Application

Adversaries may attempt to take advantage of a weakness or a vulnerability in an Internet-facing ...

keyboard_arrow_right
APT18
APT18

APT18 is a threat group that has operated since at least 2009 and has targeted a range of industr...

keyboard_arrow_right
Active Scanning
Active Scanning

Before compromising a victim, adversaries may execute active Reconnaissance scans to gather infor...

keyboard_arrow_right
DNS Hijacking
DNS Hijacking

The adversary is trying to perform a [Man in the Middle (MITM)]() attack using Domain Name Server...

keyboard_arrow_right
Man-in-the-Middle (MITM)
Man-in-the-Middle (MITM)

A man in the middle (MITM) attack is a general term for when adversaries position themselves betw...

keyboard_arrow_right
APT20
APT20

APT20 associated with Operation Wocao is suspected to be a Chinese-based cyberespioange APT group...

keyboard_arrow_right
UNC1945
UNC1945

UNC1945 is a threat group active since 2018 and is known to target telecommunication companies an...

keyboard_arrow_right
UNC2452
UNC2452

UNC2452 is a suspected Russian state-sponsored APT group behind the 2020 SolarWinds software supp...

keyboard_arrow_right
Elderwood
Elderwood

Elderwood is a suspected Chinese cyber espionage group that was reportedly responsible for the 20...

keyboard_arrow_right