You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unified-secops-platform/microsoft-threat-actor-naming.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,6 +52,7 @@ The following table shows how the family names map to the threat actors that we
52
52
|Influence operations|Influence operations|Flood|
53
53
|Groups in development|Groups in development|Storm|
54
54
55
+
55
56
The following table lists publicly disclosed threat actor names with their origin or threat actor category, previous names, and corresponding names used by other security vendors where available. This page will be updated as more info on other vendors' names become available.
56
57
57
58
|Threat actor name|Origin/Threat actor category|Other names|
0 commit comments