Pass the Hash
A Pass the Hash attack is a technique whereby an attacker captures a password hash (as opposed to the password characters) and then simply passes it through for authentication and potentially lateral access to other networked systems
Smishing
Smishing is a type of fraud that happens through text. Scammers impersonate organizations to steal your personal information or money often by sending links designed to download malware to your device.
Spearphishing
Attack Title: Risk Risk Rating: HIGH
Lateral Movement
Lateral movement is a technique that adversaries use, after compromising an endpoint, to extend access to other hosts or applications in an organization.
Malware
Malware Explained. Malware is a program or code that is created to do intentional harm to a computer, network, or server.
What is Threat Hunting
What is Threat Hunting? Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network.