◆ SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
Home / Tags

Threat-Actors

Threat Actors — Structured Adversary Intelligence | SECMONS
SECMONS Threat Actors provides structured intelligence profiles covering adversary groups, targeting patterns, tactics, campaigns, and defensive implications for security teams.
Supply Chain Attack — Compromising Trusted Vendors to Reach Downstream Targets
A supply chain attack occurs when threat actors compromise a trusted vendor, software provider, or service to gain indirect access to downstream customers. This SECMONS glossary entry explains how supply chain attacks work, common techniques, and how defenders should reduce third-party risk.
Watering Hole Attack — Targeting Victims Through Trusted Websites
A watering hole attack is a targeted strategy where attackers compromise a website frequently visited by a specific group and use it to deliver exploits or malware. This SECMONS glossary entry explains how watering hole attacks work, how they differ from mass exploit kits, and how defenders can detect and mitigate them.

Legal & Policies

  • Terms of Service (TOS)
  • Privacy Policy
  • Cookie Policy
  • Disclaimer
  • Affiliate Disclosure

Governance

  • Vulnerability Policy
  • Editorial Policy
  • Ethics & Governance
  • Methodology

Research & Intelligence

  • Research
  • Threat Actors
  • Zero-Day Tracker
  • Exploit Database
  • Reports

Resources

  • Resources
  • Sitemap
  • RSS

Company

  • Meet the Experts / Authors
  • About Us
  • Contact & Press
  • Careers / Join Us
© 2026 SECMONS. All rights reserved.
CtrlK
Search the site.