Trending Scenarios

Unavailable
Scenario
Exploiting Unpatched or Zero-day Vulnerability in VPN or Firewall Solution

Unavailable
Scenario
Most prevalent Business Email Compromise scams

Unavailable
Scenario
Software supply chain manipulation gaining unauthorised access to client environments

Unavailable
Scenario
Threats to Machine Learningâs Underlying Models

Unavailable
Scenario
Phishing attacks using Adversary-in-the-middle, Mark of the web bypass, and Telephone-Oriented Attack Delivery methods
Trending Implementation Guides

Unavailable
System
1 module
How to Create Your Stakeholder Matrix

Unavailable
System
1 module
How to be a Cyber Threat Intelligence Consumer

Unavailable
System
1 module
How to Create Your Cyber Threat Intelligence Process

Unavailable
System
6 modules
How to Create a Threat Landscape Deliverable

Unavailable
System
1 module
How to Implement Scenario-based Threat Management

Unavailable
System
1 module
How to Model Threat Scenarios in Attack Flow

Unavailable
System
1 module
How to Create Scenario-Based Incident Response Playbooks
Recently Updated

Unavailable
Scenario
Kubernetes Attacks via Vulnerability Exploitation, AWS Infiltration, and Container Break Out

Unavailable
Scenario
Exploiting Unpatched or Zero-day Vulnerability in VPN or Firewall Solution

Unavailable
Scenario
Emerging Security Threats related to GitHub

Unavailable
Scenario
IoT Enabled Attacks: From Initial Access to Industrial Control System Compromise

Unavailable
Scenario
Threats to Machine Learningâs Underlying Models

Unavailable
Scenario
Exfiltration: Emerging Methods of Data Theft
Insider Threat

Unavailable
Scenario
Malicious Exploitation of an Inadvertent Cloud Data Leak

Unavailable
Scenario
Pig Butchering and Insider Threat

Unavailable
Scenario
Payment Card Fraud Committed via Web Skimming, Account Takeovers, and Physical Skimming Attacks

Unavailable
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider
Malware Attacks

Unavailable
Scenario
Financially-motivated Ransomware and Ransomware-as-a-Service Attacks

Unavailable
Scenario
Wiper malware targeting critical network components

Unavailable
Scenario
Cryptomining Malware Targeting AWS Cloud Infrastructure

Unavailable
Scenario
Information Stealer Attack that uses Malicious Advertising and Search Engine Optimisation Poisoning

Unavailable
Scenario
Using botnets
Social Engineering Attacks

Unavailable
Scenario
Most prevalent Business Email Compromise scams

Unavailable
Scenario
Phishing attacks using Adversary-in-the-middle, Mark of the web bypass, and Telephone-Oriented Attack Delivery methods

Unavailable
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider

Unavailable
Scenario
Financially-motivated Deepfake Attacks exploiting Biometric Verification, Company Share Price, and Virtual Job Interviews

Unavailable
Scenario
Watering Hole Attack via Compromised Windows Web Servers
Fraud

Unavailable
Scenario
Pig Butchering and Insider Threat

Unavailable
Scenario
SIM Swapping Attack via Social Engineering the Mobile Network Provider

Unavailable
Scenario
Payment Card Fraud Committed via Web Skimming, Account Takeovers, and Physical Skimming Attacks

Unavailable
Scenario
Tax Fraud: Exploiting Exfiltrated Personally Identifiable Information for Fraudulent Tax Transactions

Unavailable
Scenario
Exfiltration: Emerging Methods of Data Theft
Supply Chain Attacks

Unavailable
Scenario
Software supply chain manipulation gaining unauthorised access to client environments

Unavailable
Scenario
Emerging Security Threats related to GitHub

Unavailable
Scenario
IoT Enabled Attacks: From Initial Access to Industrial Control System Compromise

Unavailable
Scenario
Kubernetes Attacks via Vulnerability Exploitation, AWS Infiltration, and Container Break Out

Unavailable
Scenario
Using botnets

Unavailable
Scenario