Common Information
Type Value
Value
Steganography - T1406.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.
Details Published Attributes CTI Title
Details Website 2024-11-17 12 Boss of the SOC Version 1 Scenario 2
Details Website 2024-11-14 72 Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-11 19 October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors - Check Point Blog
Details Website 2024-11-07 1 Cryptography: The Super-Secret Ninja Art of Hiding Your Texts From Nosy Siblings!
Details Website 2024-11-07 4 Essential Terms for Cybersecurity Conversations: Security and Key Tech Lingo A-Z
Details Website 2024-11-07 32 LATAM Malware Variants - 2023 Technical Updates | CrowdStrike
Details Website 2024-11-07 12 Category
Details Website 2024-11-04 27 Jumpy Pisces Threat Intel
Details Website 2024-11-04 694 RST TI Report Digest: 04 Nov 2024
Details Website 2024-11-04 14 Monthly Threat Actor Group Intelligence Report, August 2024 (JPN)
Details Website 2024-11-04 16 Monthly Threat Actor Group Intelligence Report, August 2024 (JPN) – Red Alert
Details Website 2024-11-03 0 How Cyber Criminals Are Evading Antivirus Software
Details Website 2024-11-01 75 Huntress CTF 2024 Writeups (Warmups and other easy ones)
Details Website 2024-11-01 2 Beyond Machines CTF Challenge Write-Up
Details Website 2024-10-31 0 Steganography in Cyber Espionage —  Hidden Data in Multimedia Files as a Stealth Attack Vector
Details Website 2024-10-30 0 How to Extract Hidden Data from Covert TCP in Wireshark
Details Website 2024-10-29 0 CEH v13: EC-Council’s Latest Certification to Arm Cybersecurity Pros with AI Skills
Details Website 2024-10-29 19 OSINT Basics: The Core Skills for Modern Information Gathering (Part 1, Images OSINT)
Details Website 2024-10-29 28 Monthly Threat Actor Group Intelligence Report, August 2024 (ENG) – Red Alert
Details Website 2024-10-26 0 Unseen Messages with LSB Steganography: The Art of Hiding Information in Plain Sight
Details Website 2024-10-24 2 MHZ_C1F WALKTHROUGH : VULNHUB
Details Website 2024-10-22 3 OilRig Cyber Attacks: APT34 Targets Aerospace Sector with Exploited Vulnerabilities and Data Theft - CloudSEK News
Details Website 2024-10-19 0 Advanced Techniques for Bypassing IDS, Firewalls, and Honeypots
Details Website 2024-10-18 12 The Mobile Malware Chronicles: Necro.N – Volume 101
Details Website 2024-10-18 12 The Mobile Malware Chronicles: Necro.N - Volume 101 - Zimperium