⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Threat
Name
Category
Tags
(comma-separated)
Description
Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and Slack, to mine valuable information. The following is a brief list of example information that may hold potential value to an adversary and may also be found on messaging applications: Testing / development credentials (i.e., Chat Messages) Source code snippets Links to network shares and other internal resources Proprietary data * Discussions about ongoing incident response efforts In addition to
Save changes
Cancel