Common Information
Type Value
Value
Conduct social engineering - T1279
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description This object is deprecated as its content has been merged into the enterprise domain. Please see the [PRE](http://attack.mitre.org/matrices/enterprise/pre/) matrix for its replacement. The prior content of this page has been preserved [here](https://attack.mitre.org/versions/v7/techniques/T1279). Social Engineering is the practice of manipulating people in order to get them to divulge information or take an action. (Citation: SEAttackVectors) (Citation: BeachSE2003)
Details Published Attributes CTI Title
Details Website 2024-11-13 0 What Data Could an MSSP Monitor on the Darknet on Behalf of their Client and Why
Details Website 2024-11-07 5 Breaking Down an IDOR Vulnerability: How I Uncovered and Exploited It on an E-Commerce Website
Details Website 2024-10-24 15 Scattered Spider x RansomHub: A New Partnership - ReliaQuest
Details Website 2024-08-07 0 Cybersecurity Moneyball Part 2: Binary Defense’s New Paradigm in Malware Detection | Binary Defense
Details Website 2024-07-09 2 OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen | Recorded Future
Details Website 2023-07-28 0 Cybersecurity, A Necessity for the Sustainability of Society
Details Website 2023-07-21 1 The Dark Side of AI
Details Website 2023-06-29 2 Retail’s Threat Landscape: 2023 Predictions
Details Website 2023-06-27 0 Red team vs blue team: What you should know
Details Website 2023-05-22 0 “Cyber Security Threats and Predictions 2023: Safeguarding Our Digital World!”
Details Website 2023-05-09 0 Virtual reality impact on cyber security
Details Website 2023-04-01 0 The dark side of ChatGPT: Criminal exploitation and challenges for law enforcement | #cybercrime | #infosec – National Cyber Security Consulting
Details Website 2023-02-26 0 59 Ways Cybercriminals Exploit ChatGPT By Betty Bassett
Details Website 2023-01-28 0 How BEC scammers use the cybercrime underground | Intel471
Details Website 2022-11-03 1 Over 2B Records Compromised from WeChat & TikTok Via a Compromised Alibaba Storage Instance | Threat Intelligence | CloudSEK
Details Website 2022-10-30 0 Indonesia’s Largest Tollway Operator PT Jasamarga Breached by the Desorden Group | Threat Intelligence | CloudSEK
Details Website 2022-10-05 30 Analysis of LilithBot Malware and Eternity Threat Group | Zscaler
Details Website 2022-06-24 9 Python (ab)using The Windows GUI - SANS Internet Storm Center
Details Website 2021-09-15 105 Phishing Eager Travelers
Details Website 2021-02-09 83 Malware Distribution Uses Discord CDN | Zscaler Blog
Details Website 2020-05-12 128 Updated BackConfig Malware Targeting Government and Military Organizations in South Asia
Details Website 2019-07-10 149 Virus Bulletin :: VB2019 paper: Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary