Frameworks & Regulations

A collection of 14 posts

Initial Access Techniques - MITRE ATT&CK

Initial Access Techniques - MITRE ATT&CK

This article discusses the 9 initial access techniques as outlined in the MITRE ATT&CK framework and provides examples of how attackers have used these techniques as well as preventative measures that can be put in place.

arrow-down