• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Use Case
      • Abuse
      • Account Compromise
      • Adversary Tactics
      • Best Practices
      • Cloud Security
      • Data Destruction
      • Lateral Movement
      • Malware
      • Privilege Escalation
      • Ransomware
      • Unauthorized Software
      • Vulnerability

    Unauthorized Software

    Name Technique Tactic
    Living Off The Land Trusted Developer Utilities Proxy Execution, MSBuild Defense Evasion
    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.