• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Use Case
      • Abuse
      • Account Compromise
      • Adversary Tactics
      • Best Practices
      • Cloud Security
      • Data Destruction
      • Lateral Movement
      • Malware
      • Privilege Escalation
      • Ransomware
      • Unauthorized Software
      • Vulnerability

    Best Practices

    Name Technique Tactic
    Asset Tracking None None
    Monitor for Updates None None
    Prohibited Traffic Allowed or Protocol Mismatch Proxy, Multi-hop Proxy Command And Control
    Router and Infrastructure Security Hardware Additions, Automated Exfiltration, Network Denial of Service, Traffic Duplication Initial Access
    Splunk Vulnerabilities Drive-by Compromise Initial Access
    Use of Cleartext Protocols None None
    Windows Attack Surface Reduction Spearphishing Attachment, Spearphishing Link, Command and Scripting Interpreter Initial Access
    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.