Coggle requires JavaScript to display documents.
threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
to detects and correlates threats & solutions by using a worldwide database monitoring system.
- The threat actor configures a host to act like a switch to take advantage of the automatic trunking port feature enabled.
- a threat actor hijacks a valid IP of another device on the subnet.