Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.
Pages in category "Automated Exfiltration"
This category contains only the following page.
Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.
This category contains only the following page.