Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
74%
"the platform ’ s url - exposed webhooks to create phishing lures that bypass traditional security filters by leveraging trusted, legitimate infrastructure. by masking malicious payloads as standard data streams, these campaigns effectively turn productivity tools into delivery ve…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1525Implant Internal Image
74%
") google api keys in android apps expose gemini endpoints to unauthorized access armed with the key, an attacker could access private files and cached content, make arbitrary gemini api calls, exhaust api quotas and disrupt legitimate services, and access any data on gemini ’ s f…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
66%
"1201 * * sha256 : 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974 md5 : aac3165ece2959f39ff98334618d10d9 talos rep : https : / / talosintelligence. com / talos _ file _ reputation? s = 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974 example filen…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
40%
"exploited zero - day that lingered for months adobe patched an arbitrary code execution vulnerability in the latest versions of its acrobat and reader for windows and macos, nearly four months after an attacker first appeared to have begun exploiting it. ( dark reading ) fake cla…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
32%
"the platform ’ s url - exposed webhooks to create phishing lures that bypass traditional security filters by leveraging trusted, legitimate infrastructure. by masking malicious payloads as standard data streams, these campaigns effectively turn productivity tools into delivery ve…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Thor provides an overview of the Q1 2026 vulnerability statistics, highlighting key trends in legacy CVEs and the evolving impact of AI on the threat landscape.