Threat Intelligence Program
                                    Techniques Addressed by Mitigation | 
                            ||||
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1656 | Impersonation | 
                                                 Threat intelligence helps defenders and users be aware of and defend against common lures and active campaigns that have been used for impersonation.  | 
                                        |
| Enterprise | T1210 | Exploitation of Remote Services | 
                                                 Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization.  | 
                                        |
| Enterprise | T1068 | Exploitation for Privilege Escalation | 
                                                 Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization.  | 
                                        |
| Enterprise | T1211 | Exploitation for Defense Evasion | 
                                                 Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization.  | 
                                        |
| Enterprise | T1212 | Exploitation for Credential Access | 
                                                 Develop a robust cyber threat intelligence capability to determine what types and levels of threat may use software exploits and 0-days against a particular organization.  | 
                                        |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.