Common Information
Type | Value |
---|---|
Value |
Steganography - T1406.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 12 | Boss of the SOC Version 1 Scenario 2 | ||
Details | Website | 2024-11-14 | 72 | Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-11 | 19 | October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors - Check Point Blog | ||
Details | Website | 2024-11-07 | 1 | Cryptography: The Super-Secret Ninja Art of Hiding Your Texts From Nosy Siblings! | ||
Details | Website | 2024-11-07 | 4 | Essential Terms for Cybersecurity Conversations: Security and Key Tech Lingo A-Z | ||
Details | Website | 2024-11-07 | 32 | LATAM Malware Variants - 2023 Technical Updates | CrowdStrike | ||
Details | Website | 2024-11-07 | 12 | Category | ||
Details | Website | 2024-11-04 | 27 | Jumpy Pisces Threat Intel | ||
Details | Website | 2024-11-04 | 694 | RST TI Report Digest: 04 Nov 2024 | ||
Details | Website | 2024-11-04 | 14 | Monthly Threat Actor Group Intelligence Report, August 2024 (JPN) | ||
Details | Website | 2024-11-04 | 16 | Monthly Threat Actor Group Intelligence Report, August 2024 (JPN) – Red Alert | ||
Details | Website | 2024-11-03 | 0 | How Cyber Criminals Are Evading Antivirus Software | ||
Details | Website | 2024-11-01 | 75 | Huntress CTF 2024 Writeups (Warmups and other easy ones) | ||
Details | Website | 2024-11-01 | 2 | Beyond Machines CTF Challenge Write-Up | ||
Details | Website | 2024-10-31 | 0 | Steganography in Cyber Espionage — Hidden Data in Multimedia Files as a Stealth Attack Vector | ||
Details | Website | 2024-10-30 | 0 | How to Extract Hidden Data from Covert TCP in Wireshark | ||
Details | Website | 2024-10-29 | 0 | CEH v13: EC-Council’s Latest Certification to Arm Cybersecurity Pros with AI Skills | ||
Details | Website | 2024-10-29 | 19 | OSINT Basics: The Core Skills for Modern Information Gathering (Part 1, Images OSINT) | ||
Details | Website | 2024-10-29 | 28 | Monthly Threat Actor Group Intelligence Report, August 2024 (ENG) – Red Alert | ||
Details | Website | 2024-10-26 | 0 | Unseen Messages with LSB Steganography: The Art of Hiding Information in Plain Sight | ||
Details | Website | 2024-10-24 | 2 | MHZ_C1F WALKTHROUGH : VULNHUB | ||
Details | Website | 2024-10-22 | 3 | OilRig Cyber Attacks: APT34 Targets Aerospace Sector with Exploited Vulnerabilities and Data Theft - CloudSEK News | ||
Details | Website | 2024-10-19 | 0 | Advanced Techniques for Bypassing IDS, Firewalls, and Honeypots | ||
Details | Website | 2024-10-18 | 12 | The Mobile Malware Chronicles: Necro.N – Volume 101 | ||
Details | Website | 2024-10-18 | 12 | The Mobile Malware Chronicles: Necro.N - Volume 101 - Zimperium |