linux-malware
linux-malware copied to clipboard
[Intel] https://github.com/rung/threat-matrix-cicd
Area
Defensive techniques
Parent threat
Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Lateral Movement, Exfiltration, Impact
Finding
https://github.com/rung/threat-matrix-cicd
Industry reference
No response
Malware reference
No response
Actor reference
No response
Component
Linux
Scenario
No response
Scenario variation
No response