Statements (47)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:terrorism
|
gptkbp:can_be |
gptkb:Hacktivists
Insider Threats Cybercriminals State-Sponsored |
gptkbp:can_be_used_to |
gptkb:Advanced_Persistent_Threats
gptkb:Botnets Malware Social Engineering Ransomware Credential Stuffing Exploit Kits Zero-Day Exploits Phishing Techniques |
gptkbp:can_operate_from |
gptkb:Anywhere
|
gptkbp:has_type |
Malicious Actor
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyber Threat Actors
|
gptkbp:is_countered_by |
gptkb:military_intelligence
gptkb:Fingerprint_sensor gptkb:security Data Encryption Firewalls Intrusion Detection Systems Regular Software Updates Cybersecurity Measures Penetration Testing Security Audits Incident Reporting User Education Incident Response Plans Vulnerability Assessments Collaboration with Law Enforcement |
gptkbp:is_motivated_by |
gptkb:Revenge
Financial Gain Corporate Espionage Ideological Beliefs Political Goals |
gptkbp:participated_in |
gptkb:Espionage
Denial of Service Attacks Data Breaches Identity Theft Financial Fraud Intellectual Property Theft |
gptkbp:targets |
gptkb:Individuals
gptkb:organization |
gptkbp:bfsParent |
gptkb:Cisco_Talos
|
gptkbp:bfsLayer |
6
|