Common Information
Type | Value |
---|---|
Value |
AZT201 - Valid Credentials |
Category | Atrm |
Type | Atrm |
Misp Type | Cluster |
Description | Adversaries may login to AzureAD using valid credentials. By logging in with valid credentials to an account or service principal, the adversary will assume all privileges of that account or service principal. If the account is privileged, this may lead to other tactics, such as persistence or privilege escalation. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-29 | 0 | Using AI for Cloud Security: CrowdStrike’s Strategy for New Threats | ||
Details | Website | 2024-10-28 | 1185 | US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security | ||
Details | Website | 2024-10-27 | 15 | PowerShell Web Access | Exploring Threat and Detection Capabilities | ||
Details | Website | 2024-10-25 | 11 | How to use Google Cloud API integration in Google SecOps | ||
Details | Website | 2024-10-25 | 23 | GOAD Part 1 | ||
Details | Website | 2024-10-25 | 0 | 2FA simple bypass lab walkthrough | ||
Details | Website | 2024-10-25 | 3 | Cisco Secure Firewall Management Center Software Command Injection Vulnerability (CVE-2024-20424) – Qualys ThreatPROTECT | ||
Details | Website | 2024-10-24 | 5 | Ransomware and Cyber Extortion in Q3 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-24 | 1 | CVE Alert: CVE-2024-20424 - RedPacket Security | ||
Details | Website | 2024-10-24 | 16 | Talos IR trends Q3 2024: Identity-based operations loom large | ||
Details | Website | 2024-10-21 | 138 | Intro to Active Directory HTB-Academy | ||
Details | Website | 2024-10-21 | 1 | Learning from the Snowflake Breach: Why Proactive Security Management is Essential for Cloud… | ||
Details | Website | 2024-10-20 | 0 | Contractor pays $300K to settle Medicare data breach • The Register | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-18 | 0 | Easy P4 Bug : Failure to Invalidate Sessions Post Password Change | ||
Details | Website | 2024-10-18 | 0 | India Inc ramps up cybersecurity workforce as data breaches hit record levels | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-17 | 47 | Threat Actors Push ClickFix Fake Browser Updates Using Stolen Credentials | ||
Details | Website | 2024-10-15 | 2 | More ransomware is stopped before reaching encryption • The Register | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-15 | 0 | 9 Common Types of Cyberattacks | NETSCOUT | ||
Details | Website | 2024-10-14 | 5 | Ransomware and Cyber Extortion in Q3 2024 - ReliaQuest | ||
Details | Website | 2024-10-14 | 0 | Cyberthreats in the Middle East H1 2024 | ||
Details | Website | 2024-10-14 | 0 | CrowdStrike’s strategy for AI and evolving threats | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-11 | 4 | HackTheBox : Active — Walkthrough | ||
Details | Website | 2024-10-11 | 5 | Volt Typhoon — Chinese State -Sponsored Threat Actors | ||
Details | Website | 2024-10-10 | 15 | Monteverde HTB Writeup as OSCP preparation | ||
Details | Website | 2024-10-10 | 3 | 15/30 MyDFIR SOC Analyst Challenge |