Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
8 threats — page 1 of 1
Name Category Tags Description
Obtain Capabilities Resource Development Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than develop… Edit
Obtain Capabilities: Artificial Intelligence Resource Development Adversaries may obtain access to generative artificial intelligence tools, such as large language mo… Edit
Obtain Capabilities: Code Signing Certificates Resource Development Adversaries may buy and/or steal code signing certificates that can be used during targeting. Code s… Edit
Obtain Capabilities: Digital Certificates Resource Development Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS cer… Edit
Obtain Capabilities: Exploits Resource Development Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes… Edit
Obtain Capabilities: Malware Resource Development Adversaries may buy, steal, or download malware that can be used during targeting. Malicious softwar… Edit
Obtain Capabilities: Tool Resource Development Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can … Edit
Obtain Capabilities: Vulnerabilities Resource Development Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulne… Edit