Human Threat Map

CultureAI’s Human Threat Map demonstrates an organised view of how attackers exploit humans to gain unauthorised access to organisations. The map highlights the techniques used by adversaries to help organisations better understand and mitigate human cyber risks. Read more.

Drag/pan to navigate [WASD]

Pinch to zoom [ZX]

Copyright Permission is hereby granted, free of charge, to any person obtaining a copy of the Human Threat Map methodology and associated documentation found at https://www.humanthreatmap.com/ (the Content), to deal in the Content without restriction, including without limitation the rights to use, copy, publish, distribute, sublicense copies of the Content, and to permit persons to whom the Content is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions or extracts of the Content.

THE CONTENT IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE CONTENT OR THE USE OR OTHER DEALINGS IN THE CONTENT.
© CultureAI Ltd
  • Technique summary
  • Human Risks
  • References
Attack Technique:

Human Risks

The following Human Risks can be exploited by attackers to contribute to this technique being successful. Click through the risks to see more information.

Selected risk:
Human Risk:
References
Type Search result Code
Searching...
No results found.