Common Information
Type | Value |
---|---|
Value |
Conduct social engineering - T1279 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | This object is deprecated as its content has been merged into the enterprise domain. Please see the [PRE](http://attack.mitre.org/matrices/enterprise/pre/) matrix for its replacement. The prior content of this page has been preserved [here](https://attack.mitre.org/versions/v7/techniques/T1279). Social Engineering is the practice of manipulating people in order to get them to divulge information or take an action. (Citation: SEAttackVectors) (Citation: BeachSE2003) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-13 | 0 | What Data Could an MSSP Monitor on the Darknet on Behalf of their Client and Why | ||
Details | Website | 2024-11-07 | 5 | Breaking Down an IDOR Vulnerability: How I Uncovered and Exploited It on an E-Commerce Website | ||
Details | Website | 2024-10-24 | 15 | Scattered Spider x RansomHub: A New Partnership - ReliaQuest | ||
Details | Website | 2024-08-07 | 0 | Cybersecurity Moneyball Part 2: Binary Defense’s New Paradigm in Malware Detection | Binary Defense | ||
Details | Website | 2024-07-09 | 2 | OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen | Recorded Future | ||
Details | Website | 2023-07-28 | 0 | Cybersecurity, A Necessity for the Sustainability of Society | ||
Details | Website | 2023-07-21 | 1 | The Dark Side of AI | ||
Details | Website | 2023-06-29 | 2 | Retail’s Threat Landscape: 2023 Predictions | ||
Details | Website | 2023-06-27 | 0 | Red team vs blue team: What you should know | ||
Details | Website | 2023-05-22 | 0 | “Cyber Security Threats and Predictions 2023: Safeguarding Our Digital World!” | ||
Details | Website | 2023-05-09 | 0 | Virtual reality impact on cyber security | ||
Details | Website | 2023-04-01 | 0 | The dark side of ChatGPT: Criminal exploitation and challenges for law enforcement | #cybercrime | #infosec – National Cyber Security Consulting | ||
Details | Website | 2023-02-26 | 0 | 59 Ways Cybercriminals Exploit ChatGPT By Betty Bassett | ||
Details | Website | 2023-01-28 | 0 | How BEC scammers use the cybercrime underground | Intel471 | ||
Details | Website | 2022-11-03 | 1 | Over 2B Records Compromised from WeChat & TikTok Via a Compromised Alibaba Storage Instance | Threat Intelligence | CloudSEK | ||
Details | Website | 2022-10-30 | 0 | Indonesia’s Largest Tollway Operator PT Jasamarga Breached by the Desorden Group | Threat Intelligence | CloudSEK | ||
Details | Website | 2022-10-05 | 30 | Analysis of LilithBot Malware and Eternity Threat Group | Zscaler | ||
Details | Website | 2022-06-24 | 9 | Python (ab)using The Windows GUI - SANS Internet Storm Center | ||
Details | Website | 2021-09-15 | 105 | Phishing Eager Travelers | ||
Details | Website | 2021-02-09 | 83 | Malware Distribution Uses Discord CDN | Zscaler Blog | ||
Details | Website | 2020-05-12 | 128 | Updated BackConfig Malware Targeting Government and Military Organizations in South Asia | ||
Details | Website | 2019-07-10 | 149 | Virus Bulletin :: VB2019 paper: Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary |