Identity & Credential Abuse

Attacks targeting user identities, passwords, and authentication systems to gain unauthorized access.

Endpoint Abuse

Threats targeting endpoints such as desktops, laptops, and mobile devices to compromise or control them.

Web Application Attacks

Exploits targeting web applications through injection, scripting, and other vulnerability-based techniques.

Post-Exploitation

Activities performed after initial access to escalate privileges, move laterally, and maintain persistence.

Infrastructure Availability

Attacks aimed at disrupting the availability of critical infrastructure, networks, and services.

Cloud & SaaS Abuse

Threats exploiting cloud services, misconfigurations, and SaaS platforms to access or manipulate data.

Trust Abuse

Attacks exploiting trust relationships between systems, supply chains, and organizational partnerships.

Advanced Techniques

Sophisticated attack methods used by APTs and skilled threat actors employing cutting-edge tactics.