Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
4 threats — page 1 of 1
Name Category Tags Description
Remote Access Tools Command And Control An adversary may use legitimate remote access tools to establish an interactive command and control … Edit
Remote Access Tools: IDE Tunneling Command And Control Adversaries may abuse Integrated Development Environment (IDE) software with remote development feat… Edit
Remote Access Tools: Remote Access Hardware Command And Control An adversary may use legitimate remote access hardware to establish an interactive command and contr… Edit
Remote Access Tools: Remote Desktop Software Command And Control An adversary may use legitimate desktop support software to establish an interactive command and con… Edit