Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
3 threats — page 1 of 1
Name Category Tags Description
Search Closed Sources Reconnaissance Adversaries may search and gather information about victims from closed (e.g., paid, private, or oth… Edit
Search Closed Sources: Purchase Technical Data Reconnaissance Adversaries may purchase technical information about victims that can be used during targeting. Info… Edit
Search Closed Sources: Threat Intel Vendors Reconnaissance Adversaries may search private data from threat intelligence vendors for information that can be use… Edit