Common Information
Type | Value |
---|---|
Value |
Vulnerabilities - T1588.006 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, be exploited by an adversary to cause unintended or unanticipated behavior to occur. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases.(Citation: National Vulnerability Database) An adversary may monitor vulnerability disclosures/databases to understand the state of existing, as well as newly discovered, vulnerabilities. There is usually a delay between when a vulnerability is discovered and when it is made public. An adversary may target the systems of those known to conduct vulnerability research (including commercial vendors). Knowledge of a vulnerability may cause an adversary to search for an existing exploit (i.e. [Exploits](https://attack.mitre.org/techniques/T1588/005)) or to attempt to develop one themselves (i.e. [Exploits](https://attack.mitre.org/techniques/T1587/004)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 1 | Exploiting IRC on Port 6667 in Metasploitable 2 | ||
Details | Website | 2024-11-16 | 0 | T-Mobile Targeted in Massive Chinese Cyber-Espionage Campaign - CloudSEK News | ||
Details | Website | 2024-11-16 | 3 | Bcrypt and the Okta Incident: What Developers Need to Know | ||
Details | Website | 2024-11-16 | 0 | Finding Information from a Phone Number: An Ethical Hacking Perspective | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity Tips for Digital Safety | ||
Details | Website | 2024-11-16 | 0 | How Internet Security Protects You from Cyber Threats | ||
Details | Website | 2024-11-16 | 6 | Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations - CyberSRC | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | Banking Industry Cyber Security Solutions | ||
Details | Website | 2024-11-16 | 0 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 1 | The Ultimate Cybersecurity Study Guide: Your Roadmap to Mastery | ||
Details | Website | 2024-11-16 | 0 | Web Security Automation: Your Shield Against Cyber Threats | ||
Details | Website | 2024-11-16 | 0 | Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide | ||
Details | Website | 2024-11-16 | 0 | Cyber Resilience in Healthcare: Safeguarding Data in a Digital Age | ||
Details | Website | 2024-11-16 | 0 | The PRC’s Cyber Attacks on US Telecoms and Government Agencies: A Growing Concern | ||
Details | Website | 2024-11-16 | 0 | What you need to know about the WannaCry Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | Introduction to Dharma - Part 1 — Haboob | ||
Details | Website | 2024-11-16 | 1 | T-Mobile confirms it was hacked in recent wave of telecom breaches | ||
Details | Website | 2024-11-16 | 6 | Fake AI video generators infect Windows, macOS with infostealers | ||
Details | Website | 2024-11-16 | 6 | Understanding and Fixing Authentication Bypass Vulnerabilities: A Case Study on Really Simple SSL | Antivirus and Security news | ||
Details | Website | 2024-11-15 | 0 | Essential Cybersecurity Certifications | ||
Details | Website | 2024-11-15 | 0 | BalckArch Linux Tools | ||
Details | Website | 2024-11-15 | 0 | BlackArch Linux | ||
Details | Website | 2024-11-15 | 3 | Enhancing Fraud Detection and Cybersecurity with Cube4D and Active Graph Networks (AGN) |