Forum Discussion
kevinh
22 days agoBronze III
CTI First Principles: Threat Actors and Attribution Question 8
For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the...
SamDickison
Community Manager
20 days agoHey kevinh, how are you getting on with this? Want me to get some support for you?
- kevinh5 hours agoBronze III
yes