SIGN-IN
Get Full Access
Scenario Intelligence Platform
Browse our collection of ready-to-use, human-curated threat scenarios that eliminate research time and strengthen your defenses immediately. Each scenario is supported by human-curated step-by-step implementation guides and customizable templates.
Create Your Account
Request Strategic Briefing
Trending Scenarios
Unavailable
Scenario
NEW Export to Excel
Unavailable
Scenario
Exploiting Unpatched or Zero-day Vulnerability in VPN or Firewall Solution
Unavailable
Scenario
Most prevalent Business Email Compromise scams
Unavailable
Scenario
Software supply chain manipulation gaining unauthorised access to client environments
Unavailable
Scenario
Threats to Machine Learning’s Underlying Models
Unavailable
Scenario
Phishing attacks using Adversary-in-the-middle, Mark of the web bypass, and Telephone-Oriented Attack Delivery methods
Trending Systems
Unavailable
Scenario
NEW Export to Excel
Unavailable
System
3 modules
How to Create Your Stakeholder Matrix
Unavailable
System
3 modules
How to be a Cyber Threat Intelligence Consumer
Unavailable
System
3 modules
How to Create Your Cyber Threat Intelligence Process
Unavailable
System
8 modules
How to Create a Threat Landscape Deliverable
Unavailable
System
3 modules
How to Implement Scenario-based Threat Management
Unavailable
System
3 modules
How to Model Threat Scenarios in Attack Flow
Unavailable
System
3 modules
How to Create Scenario-Based Incident Response Playbooks
Upcoming & Recent Updates
Unavailable
System
8 modules
How to Start Cyber Scenario Planning
Unavailable
Premium
1 module
How to Start Lean Cybersecurity
Unavailable
Premium
1 module
How to Setup Agile Security Operations
Unavailable
Premium
1 module
How to Setup an ISMS as Prompt
Unavailable
Premium
1 module
How to Setup Lean Vulnerability Management
Unavailable
Premium
1 module
How to Build Scalable Asset Management
Unavailable
Premium
3 modules
How to Boost Agile DevSecOps
Unavailable
Premium
1 module
How to Run Lean Management Reviews
Available Premium Systems
Unavailable
Premium
3 modules
How to Create a Business Case for CTI
Unavailable
Premium
3 modules
How to Create Your Adversary Profiling System
Unavailable
Premium
3 modules
How to Assess the Maturity of Your Cyber Threat Intelligence Capability
Unavailable
Premium
3 modules
How to Boost Agile DevSecOps
Unavailable
Premium
1 module
How to Setup Lean Vulnerability Management
Unavailable
Premium
1 module
How to Build Scalable Asset Management
Unavailable
Premium
1 module
How to Start Lean Cybersecurity
Unavailable
Premium
1 module
How to Run Lean Management Reviews
Unavailable
Premium
1 module
How to Setup Agile Security Operations
Unavailable
Premium
1 module
How to Setup an ISMS as Prompt
Unavailable
Premium
1 module
How to Build an Awesome Security Wiki
Unavailable
Premium
3 modules
How to Craft a Cybersecurity Budget Your CFO Can Understand
Unavailable
Premium
3 modules
How to Use Behavioral Psychology for Smarter Decision-Making
Unavailable
Premium
3 modules
How to Build Your Own Threat Management Process
Unavailable
Premium
2 modules
How to Create Your Threat Led Testing System
Unavailable
Premium
1 module
How to Effectively Use Analytical Assessments in Threat Intelligence Deliverables
Available Scenarios
Unavailable
Scenario
Credential Harvesting Attacks Using Phishing, Authentication Pages, Password manager or Extensions
Unavailable
Scenario
Organisation Infiltration by Attackers Posing as IT Employees for Remote Jobs
Unavailable
Scenario
DNS Threats: Cache Poisoning, Tunneling, Fast Flux and Domain Shadowing
Unavailable
Scenario
Adware Attacks Targeting Advertisement
Unavailable
Scenario
Threats to Mainframe Computers
Unavailable
Scenario
Espionage Against Active Directory Networks
Unavailable
Scenario
Pig Butchering and Insider Threat
Unavailable
Scenario
IoT Enabled Attacks: From Initial Access to Industrial Control System Compromise
Unavailable
Scenario
Emerging Security Threats related to GitHub
Unavailable
Scenario
Kubernetes Attacks via Vulnerability Exploitation, AWS Infiltration, and Container Break Out
Unavailable
Scenario
Threats to Machine Learning’s Underlying Models
Unavailable
Scenario
Disinformation and Spearphishing Attacks using Artificial Intelligence and Large Language Models
Unavailable
Scenario
Exfiltration: Emerging Methods of Data Theft
Unavailable
Scenario
BGP Hijacking: Methods for Rerouting and Spoofing Traffic Between Service Providers
Unavailable
Scenario
Domain Hijacking Attack
Unavailable
Scenario
Attacks Targeting Low Earth Orbit and Geostationary Orbit Satellite Systems