Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
5 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Exfiltration Over Web Service | Exfiltration | Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than thei… | Edit | |
| Exfiltration Over Web Service: Exfiltration Over Webhook | Exfiltration | Adversaries may exfiltrate data to a webhook endpoint rather than over their primary command and con… | Edit | |
| Exfiltration Over Web Service: Exfiltration to Cloud Storage | Exfiltration | Adversaries may exfiltrate data to a cloud storage service rather than over their primary command an… | Edit | |
| Exfiltration Over Web Service: Exfiltration to Code Repository | Exfiltration | Adversaries may exfiltrate data to a code repository rather than over their primary command and cont… | Edit | |
| Exfiltration Over Web Service: Exfiltration to Text Storage Sites | Exfiltration | Adversaries may exfiltrate data to text storage sites instead of their primary command and control c… | Edit |