Splunk Stored XSS via Specially Crafted Bulletin Message
Drive-by Compromise
Drive-by Compromise
Drive-by Compromise
Drive-by Compromise
Drive-by Compromise
Exploit Public-Facing Application
Drive-by Compromise
Drive-by Compromise
Drive-by Compromise
Drive-by Compromise
Drive-by Compromise
Server Software Component, Exploit Public-Facing Application, External Remote Services
Server Software Component, Exploit Public-Facing Application, External Remote Services
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Exploit Public-Facing Application
Multi-Factor Authentication Request Generation, Valid Accounts, Brute Force
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Exploit Public-Facing Application
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Valid Accounts, Brute Force
Steal Application Access Token, Phishing, Spearphishing Link
Steal Application Access Token, Phishing, Spearphishing Link
Exploit Public-Facing Application
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Drive-by Compromise
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle
Spearphishing Attachment
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Server Software Component, Web Shell, Exploit Public-Facing Application, External Remote Services
Server Software Component, Web Shell, Exploit Public-Facing Application, External Remote Services
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Compromise Software Dependencies and Development Tools, Supply Chain Compromise
Compromise Software Dependencies and Development Tools, Supply Chain Compromise
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application
Exploit Public-Facing Application
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Ingress Tool Transfer, Exploit Public-Facing Application, Command and Scripting Interpreter, External Remote Services
Ingress Tool Transfer, Exploit Public-Facing Application, Command and Scripting Interpreter, External Remote Services
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Valid Accounts
Web Shell, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Phishing, Modify Registry
Valid Accounts, Domain Accounts
Valid Accounts, Domain Accounts
Hardware Additions
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Valid Accounts
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Exploit Public-Facing Application
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Trusted Relationship
Exploit Public-Facing Application
Drive-by Compromise
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Valid Accounts, Cloud Accounts
Valid Accounts, Cloud Accounts
Drive-by Compromise
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation, Valid Accounts, Cloud Accounts
Valid Accounts
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Drive-by Compromise
Valid Accounts
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Trusted Relationship
Valid Accounts
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application
Exploit Public-Facing Application
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Server Software Component, Web Shell, Exploit Public-Facing Application, External Remote Services
Server Software Component, Web Shell, Exploit Public-Facing Application, External Remote Services
Compromise Software Supply Chain
Exploit Public-Facing Application, Command and Scripting Interpreter
Cloud Accounts
Account Manipulation, Valid Accounts
Spearphishing Attachment, Spearphishing Link, Command and Scripting Interpreter
Spearphishing Attachment, Spearphishing Link, Command and Scripting Interpreter
Drive-by Compromise
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Valid Accounts
Ingress Tool Transfer, Exploit Public-Facing Application, Command and Scripting Interpreter, External Remote Services
Ingress Tool Transfer, Exploit Public-Facing Application, Command and Scripting Interpreter, External Remote Services
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Valid Accounts, Cloud Accounts
Valid Accounts, Cloud Accounts
Phishing
Exploit Public-Facing Application
Exploit Public-Facing Application
Valid Accounts, Local Accounts
Valid Accounts, Local Accounts
Valid Accounts
Drive-by Compromise
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation, Valid Accounts, Cloud Accounts
Exploit Public-Facing Application
Account Manipulation, Valid Accounts
Exploit Public-Facing Application
External Remote Services, Exploit Public-Facing Application, Exploitation of Remote Services, Exploitation for Privilege Escalation
External Remote Services, Exploit Public-Facing Application, Exploitation of Remote Services, Exploitation for Privilege Escalation
Exploit Public-Facing Application
Valid Accounts, Domain Accounts
Valid Accounts, Domain Accounts
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Valid Accounts
System Information Discovery, External Remote Services
Compromise Software Supply Chain
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Drive-by Compromise
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Drive-by Compromise
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Valid Accounts
Exploit Public-Facing Application
Domain Accounts, Permission Groups Discovery
Valid Accounts, Domain Accounts
Valid Accounts, Domain Accounts
Domain or Tenant Policy Modification, Group Policy Modification, Domain Accounts
Command and Scripting Interpreter, Spearphishing Attachment, Spearphishing Link
Command and Scripting Interpreter, Spearphishing Attachment, Spearphishing Link
Compromise Software Supply Chain, Supply Chain Compromise
Compromise Software Supply Chain, Supply Chain Compromise
Exploit Public-Facing Application
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Valid Accounts
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Exploit Public-Facing Application
Valid Accounts, Domain Accounts
Valid Accounts, Domain Accounts
Exploit Public-Facing Application
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Exploit Public-Facing Application
Valid Accounts, Default Accounts, Modify Authentication Process
Valid Accounts, Default Accounts, Modify Authentication Process
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Valid Accounts
Phishing, Spearphishing Link
Phishing, Spearphishing Link
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Valid Accounts
Valid Accounts
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Exploit Public-Facing Application, Ingress Tool Transfer, Command and Scripting Interpreter
Replication Through Removable Media
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Compromise Software Supply Chain
Exploit Public-Facing Application
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Phishing
Compromise Software Dependencies and Development Tools, Supply Chain Compromise
Compromise Software Dependencies and Development Tools, Supply Chain Compromise
Drive-by Compromise
Phishing
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Command and Scripting Interpreter, Spearphishing Attachment, Spearphishing Link
Command and Scripting Interpreter, Spearphishing Attachment, Spearphishing Link
Exploit Public-Facing Application
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Valid Accounts
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Valid Accounts
Account Manipulation, Valid Accounts
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application
Exploit Public-Facing Application
Valid Accounts
Command and Scripting Interpreter, Exploit Public-Facing Application, External Remote Services
Command and Scripting Interpreter, Exploit Public-Facing Application, External Remote Services
Spearphishing Attachment, Phishing
Spearphishing Attachment, Phishing
Local Accounts, Credentials In Files
Network Share Discovery, Valid Accounts
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Spearphishing Attachment, Phishing, Malicious Link, User Execution
Spearphishing Attachment, Phishing, Malicious Link, User Execution
Valid Accounts, Cloud Accounts
Valid Accounts, Cloud Accounts
Hardware Additions, Automated Exfiltration, Network Denial of Service, Traffic Duplication
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Password Spraying, Valid Accounts, Default Accounts
Password Spraying, Valid Accounts, Default Accounts
Valid Accounts, Default Accounts, Credential Stuffing
Valid Accounts, Default Accounts, Credential Stuffing
Valid Accounts, Default Accounts, Password Spraying
Valid Accounts, Default Accounts, Password Spraying
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Valid Accounts
Service Stop, Valid Accounts
Valid Accounts
Valid Accounts
Valid Accounts
Phishing
Cloud Accounts
Cloud Accounts
Cloud Accounts
Cloud Accounts
Cloud Accounts
Cloud Accounts
Cloud Accounts
Spearphishing via Service
Cloud Accounts
Cloud Accounts
Valid Accounts
Cloud Accounts
Cloud Accounts
Domain Accounts