Skip to main content
Cyber Defense TacticsCyber Defense Tactics
HomeLearnResourcesBlogCommunity
Cyber Defense TacticsCyber Defense Tactics

Learn defensive security, leverage AI for cyber defense, and join a community of security professionals.

Learning

  • Blog
  • Resources
  • Newsletter

Community

  • Discord
  • YouTube
  • About

Legal

  • Privacy Policy
  • Terms of Service

© 2026 Cyber Defense Tactics. All rights reserved.

A Carbene.AI Project

Back to ATT&CK Hub
T1566

Phishing

Initial Access
Featured

Adversaries send phishing messages to gain access to victim systems. Phishing can be targeted (spearphishing) or sent to large numbers of recipients.

View on MITRE ATT&CK

Real-World Example

In the 2020 SolarWinds attack, initial access was achieved through a supply chain compromise, but many APT groups like APT29 extensively use spearphishing with malicious attachments or links.

Defense Strategies

  • Email filtering and anti-phishing tools
  • User awareness training
  • Multi-factor authentication
  • Sandboxing email attachments
  • Link protection and URL rewriting

Detection Methods

  • Monitor for suspicious email patterns
  • Analyze attachment behavior in sandbox
  • Track clicks on external links
  • Correlate with threat intelligence feeds

Related Techniques in Initial Access

T1190

Exploit Public-Facing Application

T1133

External Remote Services

Ready to explore more techniques and join the community?