Protect/Detect/Hunt series
Not every protection is detection based, it can also be prevention by configuring your network to standards. This blog series (MITRE Hunting) will focus on each MITRE technique and tactics, its detection/prevention process.
Initial Access consists of techniques that use various entry vectors to gain their initial foothold…