mirror of
https://github.com/DISARMFoundation/DISARMframeworks.git
synced 2025-12-15 16:29:14 -05:00
Update descriptions for T0104.003, T0123.004, T0135.001, T0140.001 and files for STIX Bundle
This commit is contained in:
parent
62680c33d5
commit
a604c155cf
736 changed files with 15123 additions and 2928 deletions
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0104.003: Private/Closed Social Networks
|
||||
|
||||
* **Summary**: An audio livestream refers to an online audio broadcast capability that allows for real-time communication to closed or open networks. Examples include Twitter Spaces,
|
||||
* **Summary**: Social networks that are not open to people outside of family, friends, neighbours, or co-workers. Non-work-related examples include Couple, FamilyWall, 23snaps, and Nextdoor. Some of the larger social network platforms enable closed communities: examples are Instagram Close Friends and Twitter (X) Circle. Work-related examples of private social networks include LinkedIn, Facebook Workplace, and enterprise communication platforms such as Slack or Microsoft Teams.
|
||||
|
||||
* **Belongs to tactic stage**: TA07
|
||||
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
# Technique T0123.004: Conduct Server Redirect
|
||||
|
||||
* **Summary**: A server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.
|
||||
* **Summary**: A server redirect, also known as a URL redirect, occurs when a server automatically forwards a user from one URL to another using server-side or client-side scripting languages. An influence operation may conduct a server redirect to divert target audience members from one website to another without their knowledge. The redirected website may pose as a legitimate source, host malware, or otherwise aid operation objectives.
|
||||
|
||||
* **Belongs to tactic stage**: TA18
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue