ATT&CK #8 - Registry Run Keys / Startup Folder
Adversaries utilize run Keys in the Registry and Startup Folders for persistence. This course provides information about registry keys and startup folders used by attackers and use cases by threat actors and malware.
Red Report 2023
Improve your understanding of trending adversary TTPs
Get practical recommendations for enhancing your security posture
Obtain real-world examples for red teams