Forum Discussion

kevinh's avatar
kevinh
Bronze III
22 days ago

CTI First Principles: Threat Actors and Attribution Question 8

For the question:  Which sub-technique has been attributed to this threat actor in the Credential Access Tactic?  as the briefing was talking about phishing through attachment, for some reason, the...