Skip to content

Initial Access

Phishing

Just two resources (I am not even trying to provide a link to relevant incidents; I would not know where to start):

Case Studies

The MITRE ATT&CK website contains a number of real cases where each technique has been used. The examples listed here are just a bunch of further examples, particularly interesting because they illustrate all the intrusion steps that followed Initial Access.

Appendix: Secure email (SPF, DKIM, DMARC)