{"id":3727,"count":124,"description":"","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/threat-intelligence\/attacker-techniques-tools-and-infrastructure\/","name":"Attacker techniques, tools, and infrastructure","slug":"attacker-techniques-tools-and-infrastructure","taxonomy":"threat-intelligence","parent":0,"meta":[],"yoast_head":"\n