Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
8 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Obtain Capabilities | Resource Development | Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than develop… | Edit | |
| Obtain Capabilities: Artificial Intelligence | Resource Development | Adversaries may obtain access to generative artificial intelligence tools, such as large language mo… | Edit | |
| Obtain Capabilities: Code Signing Certificates | Resource Development | Adversaries may buy and/or steal code signing certificates that can be used during targeting. Code s… | Edit | |
| Obtain Capabilities: Digital Certificates | Resource Development | Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS cer… | Edit | |
| Obtain Capabilities: Exploits | Resource Development | Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes… | Edit | |
| Obtain Capabilities: Malware | Resource Development | Adversaries may buy, steal, or download malware that can be used during targeting. Malicious softwar… | Edit | |
| Obtain Capabilities: Tool | Resource Development | Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can … | Edit | |
| Obtain Capabilities: Vulnerabilities | Resource Development | Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulne… | Edit |