As the Cyber Threat Environment Escalates, How are Organizations Responding?
Tags
attack-pattern: | Data Models Software - T1592.002 Tool - T1588.002 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | 20b3f12c-7013-485f-9846-ea67041ce6d9 |
Fingerprint | 27c32a94191d039d |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Aug. 23, 2022, 5:29 p.m. |
Added to db | Sept. 11, 2022, 12:30 p.m. |
Last updated | Sept. 4, 2024, 8:38 p.m. |
Headline | As the Cyber Threat Environment Escalates, How are Organizations Responding? |
Title | As the Cyber Threat Environment Escalates, How are Organizations Responding? |
Detected Hints/Tags/Attributes | 33/1/0 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 162 | ✔ | — | https://media.cert.europa.eu/rss?type=category&id=APTFilter&language=en&duplicates=false | 2024-08-30 22:08 |