Open links in new tab
  1. Static Network Configuration - ICS | MITRE ATT&CK®

    Currently viewing which was live between April 25, 2023 and October 30, 2023. or .

  2. Vulnerability Scanning, Mitigation M0916 - ICS | MITRE ATT&CK®

    Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.

  3. Hijack Execution Flow: System Runtime API Hijacking, Sub …

    Adversaries may execute their own malicious payloads by hijacking the way an operating system run applications. Hijacking execution flow can be for the purposes of persistence since this …

  4. Operation Honeybee, Campaign C0006 | MITRE ATT&CK®

    Apr 25, 2023 · Operation Honeybee was a campaign that targeted humanitarian aid and inter-Korean affairs organizations from at least late 2017 through early 2018. Operation Honeybee …

  5. Firmware, Data Source DS0001 | MITRE ATT&CK®

    Firmware: Firmware Modification Changes made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)