Overview
A globally accessible knowledge base of adversary tactics and techniques based on real-world cyber observations.
More in Cybersecurity
Data Loss Prevention
Data ProtectionTechnology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Cyber Insurance
Security GovernanceInsurance coverage protecting organisations against financial losses from cyberattacks, data breaches, and related incidents.
Man-in-the-Middle Attack
Offensive SecurityAn attack where the attacker secretly relays and potentially alters communication between two parties.
Phishing-Resistant Authentication
Identity & AccessAuthentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.
Runtime Application Self-Protection
Offensive SecuritySecurity technology embedded within applications that detects and blocks attacks in real time by monitoring application behaviour and request patterns during execution.
Breach and Attack Simulation
Offensive SecurityAutomated security testing that continuously simulates real-world attack scenarios against production environments to validate defensive controls and identify security gaps.
Zero Trust Architecture
Network SecurityA security model that requires strict identity verification for every person and device accessing resources regardless of location.