Open links in new tab

Static Network Configuration - ICS | MITRE ATT&CK®
Currently viewing which was live between April 25, 2023 and October 30, 2023. or .
Vulnerability Scanning, Mitigation M0916 - ICS | MITRE ATT&CK®
Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.
Hijack Execution Flow: System Runtime API Hijacking, Sub …
Adversaries may execute their own malicious payloads by hijacking the way an operating system run applications. Hijacking execution flow can be for the purposes of persistence since this …
Operation Honeybee, Campaign C0006 | MITRE ATT&CK®
Apr 25, 2023 · Operation Honeybee was a campaign that targeted humanitarian aid and inter-Korean affairs organizations from at least late 2017 through early 2018. Operation Honeybee …
Firmware, Data Source DS0001 | MITRE ATT&CK®
Firmware: Firmware Modification Changes made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)