Threat-Actors
Threat Actors — Structured Adversary Intelligence | SECMONS
SECMONS Threat Actors provides structured intelligence profiles covering adversary groups, targeting patterns, tactics, campaigns, and defensive implications for security teams.
Supply Chain Attack — Compromising Trusted Vendors to Reach Downstream Targets
A supply chain attack occurs when threat actors compromise a trusted vendor, software provider, or service to gain indirect access to downstream customers. This SECMONS glossary entry explains how supply chain attacks work, common techniques, and how defenders should reduce third-party risk.
Watering Hole Attack — Targeting Victims Through Trusted Websites
A watering hole attack is a targeted strategy where attackers compromise a website frequently visited by a specific group and use it to deliver exploits or malware. This SECMONS glossary entry explains how watering hole attacks work, how they differ from mass exploit kits, and how defenders can detect and mitigate them.