Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
3 threats — page 1 of 1
Name Category Tags Description
Software Extensions Persistence Adversaries may abuse software extensions to establish persistent access to victim systems. Software… Edit
Software Extensions: Browser Extensions Persistence Adversaries may abuse internet browser extensions to establish persistent access to victim systems. … Edit
Software Extensions: IDE Extensions Persistence Adversaries may abuse an integrated development environment (IDE) extension to establish persistent … Edit