SIGN-IN
Get Full Library Access
Scenario Intelligence Library
Browse our collection of deployment-ready threat scenarios that eliminate research time and strengthen your defenses immediately. Each scenario is supported by step-by-step implementation guides and customizable resources.
Try Free Scenario đ
Get Full Library Access đ
Trending Scenarios
Unavailable
Scenario
Exploiting Unpatched or Zero-day Vulnerability in VPN or Firewall Solution
Unavailable
Scenario
Most prevalent Business Email Compromise scams
Unavailable
Scenario
Software supply chain manipulation gaining unauthorised access to client environments
Unavailable
Scenario
Threats to Machine Learningâs Underlying Models
Unavailable
Scenario
Phishing attacks using Adversary-in-the-middle, Mark of the web bypass, and Telephone-Oriented Attack Delivery methods
Trending Implementation Guides
Unavailable
System
1 module
How to Create Your Stakeholder Matrix
Unavailable
System
1 module
How to be a Cyber Threat Intelligence Consumer
Unavailable
System
1 module
How to Create Your Cyber Threat Intelligence Process
Unavailable
System
6 modules
How to Create a Threat Landscape Deliverable
Unavailable
System
1 module
How to Implement Scenario-based Threat Management
Unavailable
System
1 module
How to Model Threat Scenarios in Attack Flow
Unavailable
System
1 module
How to Create Scenario-Based Incident Response Playbooks
Recently Updated
Unavailable
Scenario
Kubernetes Attacks via Vulnerability Exploitation, AWS Infiltration, and Container Break Out
Unavailable
Scenario
Exploiting Unpatched or Zero-day Vulnerability in VPN or Firewall Solution
Unavailable
Scenario
Emerging Security Threats related to GitHub
Unavailable
Scenario
IoT Enabled Attacks: From Initial Access to Industrial Control System Compromise
Unavailable
Scenario
Threats to Machine Learningâs Underlying Models
Unavailable
Scenario
Exfiltration: Emerging Methods of Data Theft
Insider Threat
Unavailable
Scenario
Malicious Exploitation of an Inadvertent Cloud Data Leak
Unavailable
Scenario
Pig Butchering and Insider Threat
Unavailable
Scenario
Payment Card Fraud Committed via Web Skimming, Account Takeovers, and Physical Skimming Attacks
Unavailable
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider
Malware Attacks
Unavailable
Scenario
Financially-motivated Ransomware and Ransomware-as-a-Service Attacks
Unavailable
Scenario
Wiper malware targeting critical network components
Unavailable
Scenario
Cryptomining Malware Targeting AWS Cloud Infrastructure
Unavailable
Scenario
Information Stealer Attack that uses Malicious Advertising and Search Engine Optimisation Poisoning
Unavailable
Scenario
Using botnets
Social Engineering Attacks
Unavailable
Scenario
Most prevalent Business Email Compromise scams
Unavailable
Scenario
Phishing attacks using Adversary-in-the-middle, Mark of the web bypass, and Telephone-Oriented Attack Delivery methods
Unavailable
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider
Unavailable
Scenario
Financially-motivated Deepfake Attacks exploiting Biometric Verification, Company Share Price, and Virtual Job Interviews
Unavailable
Scenario
Watering Hole Attack via Compromised Windows Web Servers
Fraud
Unavailable
Scenario
Pig Butchering and Insider Threat
Unavailable
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider
Unavailable
Scenario
Payment Card Fraud Committed via Web Skimming, Account Takeovers, and Physical Skimming Attacks
Unavailable
Scenario
Tax Fraud: Exploiting Exfiltrated Personally Identifiable Information for Fraudulent Tax Transactions
Unavailable
Scenario
Exfiltration: Emerging Methods of Data Theft
Supply Chain Attacks
Unavailable
Scenario
Software supply chain manipulation gaining unauthorised access to client environments
Unavailable
Scenario
Emerging Security Threats related to GitHub
Unavailable
Scenario
IoT Enabled Attacks: From Initial Access to Industrial Control System Compromise
Unavailable
Scenario
Kubernetes Attacks via Vulnerability Exploitation, AWS Infiltration, and Container Break Out
Unavailable
Scenario
Using botnets
Unavailable
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider