Critical Infrastructure Cybersecurity Framework
T1596Recon2 Mitigations

Search Open Technical Databases

Adversaries may search freely available technical databases for information about victims.

Description

Adversaries may search freely available technical databases for information about victims.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Pre-compromiseThreat Intelligence Program

Quick Info

Technique ID
T1596
Tactic
Recon
Sub-Techniques
5
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.