{"version":"1.0","provider_name":"\u6781\u7b80IT\uff5cSimpleIT","provider_url":"https:\/\/www.ruianding.com\/blog","author_name":"Ruian Ding","author_url":"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/","title":"ATT&CK for Enterprise - TA0010 Exfiltration - \u6781\u7b80IT\uff5cSimpleIT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"SBDmGXAhUk\"><a href=\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/\">ATT&#038;CK for Enterprise &#8211; TA0010 Exfiltration<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-exfiltration\/embed\/#?secret=SBDmGXAhUk\" width=\"600\" height=\"338\" title=\"&#8220;ATT&#038;CK for Enterprise &#8211; TA0010 Exfiltration&#8221; &#8212; \u6781\u7b80IT\uff5cSimpleIT\" data-secret=\"SBDmGXAhUk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ruianding.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Exfiltration, Tactic TA0010 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae &#8220;Exfiltration&#8221; in the context of cybersecurity refers to the unauthorized transfer of data from a computer or other device. This tactic, often seen in data breaches and espionage \u2460, aims to stealthily acquire sensitive information such as personal data, corporate secrets, or intellectual property. Attackers employ various [&hellip;]","thumbnail_url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-12.png","thumbnail_width":2480,"thumbnail_height":907}