Identity & Credential Abuse
Attacks targeting user identities, passwords, and authentication systems to gain unauthorized access.
Endpoint Abuse
Threats targeting endpoints such as desktops, laptops, and mobile devices to compromise or control them.
Web Application Attacks
Exploits targeting web applications through injection, scripting, and other vulnerability-based techniques.
Post-Exploitation
Activities performed after initial access to escalate privileges, move laterally, and maintain persistence.
Infrastructure Availability
Attacks aimed at disrupting the availability of critical infrastructure, networks, and services.
Cloud & SaaS Abuse
Threats exploiting cloud services, misconfigurations, and SaaS platforms to access or manipulate data.
Trust Abuse
Attacks exploiting trust relationships between systems, supply chains, and organizational partnerships.
Advanced Techniques
Sophisticated attack methods used by APTs and skilled threat actors employing cutting-edge tactics.