FantasticLogs.Cloud
Track and analyze cloud security events using the MITRE ATT&CK framework. Coming soon...
Tactics
Section titled “Tactics” Initial Access Techniques used to gain initial foothold
Execution Techniques used to run malicious code
Persistence Methods to maintain access across restarts
Privilege Escalation Techniques to gain higher-level permissions
Defense Evasion Techniques to avoid being detected
Credential Access Techniques for stealing account credentials
Discovery Techniques to gain knowledge about the system
Lateral Movement Methods to move through networks
Collection Techniques for gathering information
Exfiltration Techniques to steal data from the network
Impact Techniques causing disruption or damage
All Events Browse all security events and incidents