64
|
Cloud Accounts
|
85
|
Compromise Hardware Supply Chain
|
87
|
Compromise Software Dependencies and Development Tools
|
88
|
Compromise Software Supply Chain
|
132
|
Default Accounts
|
155
|
Domain Accounts
|
167
|
Drive-by Compromise
|
204
|
Exploit Public-Facing Application
|
214
|
External Remote Services
|
237
|
Hardware Additions
|
289
|
Local Accounts
|
367
|
Phishing
|
411
|
Replication Through Removable Media
|
471
|
Spearphishing Attachment
|
473
|
Spearphishing Link
|
476
|
Spearphishing via Service
|
488
|
Supply Chain Compromise
|
521
|
Trusted Relationship
|
535
|
Valid Accounts
|