Video Capture
An adversary can leverage a computer's peripheral devices or applications to capture video recordings.
Description
An adversary can leverage a computer's peripheral devices or applications to capture video recordings.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
Operating System Configuration
Quick Info
- Technique ID
- T1125
- Tactic
- Collection
- Mitigations
- 1
