Common Information
Type Value
Value
Vulnerabilities - T1588.006
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, be exploited by an adversary to cause unintended or unanticipated behavior to occur. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases.(Citation: National Vulnerability Database) An adversary may monitor vulnerability disclosures/databases to understand the state of existing, as well as newly discovered, vulnerabilities. There is usually a delay between when a vulnerability is discovered and when it is made public. An adversary may target the systems of those known to conduct vulnerability research (including commercial vendors). Knowledge of a vulnerability may cause an adversary to search for an existing exploit (i.e. [Exploits](https://attack.mitre.org/techniques/T1588/005)) or to attempt to develop one themselves (i.e. [Exploits](https://attack.mitre.org/techniques/T1587/004)).
Details Published Attributes CTI Title
Details Website 2024-11-16 1 Exploiting IRC on Port 6667 in Metasploitable 2
Details Website 2024-11-16 0 T-Mobile Targeted in Massive Chinese Cyber-Espionage Campaign - CloudSEK News
Details Website 2024-11-16 3 Bcrypt and the Okta Incident: What Developers Need to Know
Details Website 2024-11-16 0 Finding Information from a Phone Number: An Ethical Hacking Perspective
Details Website 2024-11-16 0 Cybersecurity Tips for Digital Safety
Details Website 2024-11-16 0 How Internet Security Protects You from Cyber Threats
Details Website 2024-11-16 6 Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations - CyberSRC
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 0 Banking Industry Cyber Security Solutions
Details Website 2024-11-16 0 Solid Security Pro Review
Details Website 2024-11-16 1 The Ultimate Cybersecurity Study Guide: Your Roadmap to Mastery
Details Website 2024-11-16 0 Web Security Automation: Your Shield Against Cyber Threats
Details Website 2024-11-16 0 Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide
Details Website 2024-11-16 0 Cyber Resilience in Healthcare: Safeguarding Data in a Digital Age
Details Website 2024-11-16 0 The PRC’s Cyber Attacks on US Telecoms and Government Agencies: A Growing Concern
Details Website 2024-11-16 0 What you need to know about the WannaCry Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 0 Introduction to Dharma - Part 1 — Haboob
Details Website 2024-11-16 1 T-Mobile confirms it was hacked in recent wave of telecom breaches
Details Website 2024-11-16 6 Fake AI video generators infect Windows, macOS with infostealers
Details Website 2024-11-16 6 Understanding and Fixing Authentication Bypass Vulnerabilities: A Case Study on Really Simple SSL | Antivirus and Security news
Details Website 2024-11-15 0 Essential Cybersecurity Certifications
Details Website 2024-11-15 0 BalckArch Linux Tools
Details Website 2024-11-15 0 BlackArch Linux
Details Website 2024-11-15 3 Enhancing Fraud Detection and Cybersecurity with Cube4D and Active Graph Networks (AGN)