<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cognitiveattacktaxonomy.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Info</id>
	<title>Cognitive Attack Taxonomy - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cognitiveattacktaxonomy.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Info"/>
	<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php/Special:Contributions/Info"/>
	<updated>2026-04-19T06:53:00Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=518</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=518"/>
		<updated>2026-03-12T19:01:55Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) is an evolving project designed to provide a common language and framework for conceiving and communicating about cognitive attack concepts, vulnerabilities, exploits, and TTPs. This is page represents a work in progress. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2025-002    	 || 	 [[Habituation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2025-001    	 || 	 [[Vigilance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	 8    	 || 	TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0) =====&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) is made available under the Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This means that you are free to share the Cognitive Attack Taxonomy — copy and redistribute the material in any medium or format — provided that the following conditions are met:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Attribution – You must give appropriate credit to the Cognitive Attack Taxonomy and the Cognitive Security Institute, provide a link to the license, and indicate if changes were made.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NonCommercial – You may not use the material for commercial purposes.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
NoDerivatives – If you remix, transform, or build upon the material, you may not distribute the modified material.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The full legal terms of this license can be found here:&lt;br /&gt;
https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
By using or sharing the Cognitive Attack Taxonomy, you agree to comply with the terms of this license.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in commercial use, derivative works, partnerships, or expanded licensing, please contact the Cognitive Security Institute to discuss collaboration opportunities.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=517</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=517"/>
		<updated>2026-03-12T18:56:14Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) is an evolving project designed to provide a common language and framework for conceiving and communicating about cognitive attack concepts, vulnerabilities, exploits, and TTPs. This is page represents a work in progress. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2025-002    	 || 	 [[Habituation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2025-001    	 || 	 [[Vigilance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	 8    	 || 	TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0) =====&lt;br /&gt;
&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) is made available under the Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).&lt;br /&gt;
&lt;br /&gt;
This means that you are free to share the Cognitive Attack Taxonomy — copy and redistribute the material in any medium or format — provided that the following conditions are met:&lt;br /&gt;
&lt;br /&gt;
Attribution – You must give appropriate credit to the Cognitive Attack Taxonomy and the Cognitive Security Institute, provide a link to the license, and indicate if changes were made.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
NonCommercial – You may not use the material for commercial purposes.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
NoDerivatives – If you remix, transform, or build upon the material, you may not distribute the modified material.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The full legal terms of this license can be found here:&lt;br /&gt;
https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
By using or sharing the Cognitive Attack Taxonomy, you agree to comply with the terms of this license.&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in commercial use, derivative works, partnerships, or expanded licensing, please contact the Cognitive Security Institute to discuss collaboration opportunities.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=516</id>
		<title>CognitiveAttackTaxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=516"/>
		<updated>2026-03-12T18:51:25Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ &#039;&#039;&#039;&lt;br /&gt;
== Cognitive Attack Taxonomy ==&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
CAT v2025.1&lt;br /&gt;
© 2025 Cognitive Security Institute. Licensed for non-commercial use under CC BY-NC 4.0.&lt;br /&gt;
&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) is made available under the Creative Commons Attribution–NonCommercial–NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).&lt;br /&gt;
&lt;br /&gt;
This means that you are free to share the Cognitive Attack Taxonomy — copy and redistribute the material in any medium or format — provided that the following conditions are met:&lt;br /&gt;
&lt;br /&gt;
Attribution – You must give appropriate credit to the Cognitive Attack Taxonomy and the Cognitive Security Institute, provide a link to the license, and indicate if changes were made.&lt;br /&gt;
&lt;br /&gt;
NonCommercial – You may not use the material for commercial purposes.&lt;br /&gt;
&lt;br /&gt;
NoDerivatives – If you remix, transform, or build upon the material, you may not distribute the modified material.&lt;br /&gt;
&lt;br /&gt;
The full legal terms of this license can be found here:&lt;br /&gt;
https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en&lt;br /&gt;
&lt;br /&gt;
By using or sharing the Cognitive Attack Taxonomy, you agree to comply with the terms of this license.&lt;br /&gt;
&lt;br /&gt;
If you are interested in commercial use, derivative works, partnerships, or expanded licensing, please contact the Cognitive Security Institute to discuss collaboration opportunities.&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=515</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=515"/>
		<updated>2026-03-08T21:24:10Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) is an evolving project designed to provide a common language and framework for conceiving and communicating about cognitive attack concepts, vulnerabilities, exploits, and TTPs. This is page represents a work in progress. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2025-002    	 || 	 [[Habituation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2025-001    	 || 	 [[Vigilance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	 8    	 || 	TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=514</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=514"/>
		<updated>2026-03-08T21:23:17Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) is an evolving project designed to provide a common language and framework for conceiving and communicating about cognitive attack concepts, vulnerabilities, exploits, and TTPs. This is page represents a work in progress. &lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2025-002    	 || 	 [[Habituation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2025-001    	 || 	 [[Vigilance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	 8    	 || 	TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Forcing&amp;diff=513</id>
		<title>Forcing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Forcing&amp;diff=513"/>
		<updated>2025-11-04T01:14:14Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Forcing   */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Forcing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A category of techniques used by magicians to guide audience attention &amp;lt;ref&amp;gt;Use the Force: How Magicians Can Control Your Decisions&amp;lt;br&amp;gt;https://archive.is/vuTYB&amp;lt;/ref&amp;gt;. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-285 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A category of techniques used by magicians to guide audience attention. (Malin et al, 2017 p.35) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Forcing&amp;diff=512</id>
		<title>Forcing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Forcing&amp;diff=512"/>
		<updated>2025-11-04T01:13:44Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Forcing   */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Forcing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  A category of techniques used by magicians to guide audience attention &amp;lt;ref&amp;gt;Use the Force: How Magicians Can Control Your Decisions|https://archive.is/vuTYB&amp;lt;/ref&amp;gt;. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-285 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; A category of techniques used by magicians to guide audience attention. (Malin et al, 2017 p.35) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Vigilance&amp;diff=511</id>
		<title>Vigilance</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Vigilance&amp;diff=511"/>
		<updated>2025-11-04T01:11:14Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Vigilance&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;   &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2025-001 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039; [[Habituation]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: &amp;lt;br&amp;gt;&lt;br /&gt;
[[Misdirection-Distraction]] (Exploit, CAT-2022-014)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Habituation&amp;diff=510</id>
		<title>Habituation</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Habituation&amp;diff=510"/>
		<updated>2025-11-04T01:09:18Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Vigilance&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039; Habituation is a form of non-associative learning   &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2025-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039; [[Vigilance]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Habituation describes the progressive exposure to a stimulus, environment, or situation with benign results leading to the eventual relaxation of vigilance or awareness of the cues being habituated. This process may be deliberately employed by threat actors to lower the attention that the target directs toward the feature the attacker is attempting to mask.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: &amp;lt;br&amp;gt;&lt;br /&gt;
[[Misdirection-Distraction]] (Exploit, CAT-2022-014) &amp;lt;br&amp;gt;&lt;br /&gt;
[[Gray Signal Attacks]] (TTP, CAT-2022-193) &amp;lt;br&amp;gt;&lt;br /&gt;
[[Boredom]] (Vulnerability, CAT-2022-190) &amp;lt;br&amp;gt;&lt;br /&gt;
[[Firehose of Falsehood]] (TTP, CAT-2022-284)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Habituation&amp;diff=509</id>
		<title>Habituation</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Habituation&amp;diff=509"/>
		<updated>2025-11-04T01:08:50Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Vigilance&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039; Habituation is a form of non-associative learning   &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2025-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039; [[Vigilance]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Habituation describes the progressive exposure to a stimulus, environment, or situation with benign results leading to the eventual relaxation of vigilance or awareness of the cues being habituated. This process may be deliberately employed by threat actors to lower the attention that the target directs toward the feature the attacker is attempting to mask.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: &lt;br /&gt;
[[Misdirection-Distraction]] (Exploit, CAT-2022-014) &amp;lt;br&amp;gt;&lt;br /&gt;
[[Gray Signal Attacks]] (TTP, CAT-2022-193) &amp;lt;br&amp;gt;&lt;br /&gt;
[[Boredom]] (Vulnerability, CAT-2022-190)&lt;br /&gt;
[[Firehose of Falsehood]] (TTP, CAT-2022-284)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Habituation&amp;diff=508</id>
		<title>Habituation</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Habituation&amp;diff=508"/>
		<updated>2025-11-03T22:52:37Z</updated>

		<summary type="html">&lt;p&gt;Info: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Vigilance&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039; Habituation is a form of non-associative learning   &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2025-002 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Exploit &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039; &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Multipliers:&amp;#039;&amp;#039;&amp;#039;   &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Detailed Description:&amp;#039;&amp;#039;&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Vigilance&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039; Habituation is a form of non-associative learning   &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2025-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: [[Misdirection-Distraction]] (Exploit, CAT-2022-014)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=507</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=507"/>
		<updated>2025-11-03T22:45:44Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2025-002    	 || 	 [[Habituation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2025-001    	 || 	 [[Vigilance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	 8    	 || 	TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=506</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=506"/>
		<updated>2025-11-03T22:23:49Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2025-002    	 || 	 [[Habituation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2025-001    	 || 	 [[Vigilance  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	 8    	 || 	TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Vigilance&amp;diff=505</id>
		<title>Vigilance</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Vigilance&amp;diff=505"/>
		<updated>2025-11-03T22:22:19Z</updated>

		<summary type="html">&lt;p&gt;Info: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Vigilance&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;   &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2025-001 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;&amp;#039;&amp;#039; Tactical &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Level of Maturity:&amp;#039;&amp;#039;&amp;#039; In Common Use &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Category:&amp;#039;&amp;#039;&amp;#039;  Vulnerability &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Subcategory:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Also Known As:&amp;#039;&amp;#039;&amp;#039; &amp;lt;br&amp;gt;  == &amp;#039;&amp;#039;&amp;#039;Description:&amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Closely Related Concepts:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Mechanism:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Multipliers:&amp;#039;&amp;#039;&amp;#039;   &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Detailed Description:&amp;#039;&amp;#039;&amp;#039;  &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;INTERACTIONS&amp;#039;&amp;#039;&amp;#039; [VETs]: Misdirect...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Vigilance&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;   &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2025-001 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: [[Misdirection-Distraction]] (Exploit, CAT-2022-014)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=504</id>
		<title>High Conscientiousness</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=504"/>
		<updated>2025-10-25T15:16:52Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;High Conscientiousness  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Personality dimension, high attentativeness to detail &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2021-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039; High Conscientiousness as a potential cognitive vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039; Low Conscientiousness [https://cognitiveattacktaxonomy.org/index.php/Low_Conscientiousness| CAT-2021-007 ] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism(s):&#039;&#039;&#039; Deliberate False Statement [https://cognitiveattacktaxonomy.org/index.php/Deliberate_False_Statement| CAT-2022-152 ] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multiplier(s):&#039;&#039;&#039; The Need To Correct [https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| CAT-2024-007 ] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Big 5 Personality dimension describing how attentative an individual is to detail. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s): &#039;&#039;&#039;  &amp;lt;br&amp;gt;Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [[https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| need to correct]] errors is a potential vulnerability in individuals high in Conscientiousness&amp;lt;ref&amp;gt;Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). [https://papers.ssrn.com/sol3/papers.cfm?abstract%20id=2544742 Spear-phishing in the wild]: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks.&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=503</id>
		<title>High Conscientiousness</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=503"/>
		<updated>2025-10-25T15:15:35Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;High Conscientiousness  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Personality dimension, high attentativeness to detail &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2021-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039; High Conscientiousness as a potential cognitive vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039; Low Conscientiousness &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism(s):&#039;&#039;&#039; Deliberate False Statement [https://cognitiveattacktaxonomy.org/index.php/Deliberate_False_Statement| CAT-2022-152 ] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multiplier(s):&#039;&#039;&#039; The Need To Correct [https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| CAT-2024-007 ] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Big 5 Personality dimension describing how attentative an individual is to detail. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt; --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s): &#039;&#039;&#039;  &amp;lt;br&amp;gt;Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [[https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| need to correct]] errors is a potential vulnerability in individuals high in Conscientiousness&amp;lt;ref&amp;gt;Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). [https://papers.ssrn.com/sol3/papers.cfm?abstract%20id=2544742 Spear-phishing in the wild]: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks.&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=502</id>
		<title>High Conscientiousness</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=502"/>
		<updated>2025-10-25T15:04:46Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Examples: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;High Conscientiousness  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Personality dimension, high attentativeness to detail &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2021-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Big 5 Personality dimension describing how attentative an individual is to detail. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s): &#039;&#039;&#039;  &amp;lt;br&amp;gt;Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [[https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| need to correct]] errors is a potential vulnerability in individuals high in Conscientiousness&amp;lt;ref&amp;gt;Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). [https://papers.ssrn.com/sol3/papers.cfm?abstract%20id=2544742 Spear-phishing in the wild]: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks.&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=501</id>
		<title>High Conscientiousness</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=501"/>
		<updated>2025-10-25T15:04:05Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Examples: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;High Conscientiousness  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Personality dimension, high attentativeness to detail &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2021-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Big 5 Personality dimension describing how attentative an individual is to detail. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild: &#039;&#039;&#039;  &amp;lt;br&amp;gt;Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [[https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| need to correct]] errors is a potential vulnerability in individuals high in Conscientiousness&amp;lt;ref&amp;gt;Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). [https://papers.ssrn.com/sol3/papers.cfm?abstract%20id=2544742 Spear-phishing in the wild]: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks.&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=500</id>
		<title>High Conscientiousness</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=500"/>
		<updated>2025-10-25T15:00:58Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Examples: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;High Conscientiousness  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Personality dimension, high attentativeness to detail &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2021-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Big 5 Personality dimension describing how attentative an individual is to detail. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild: &#039;&#039;&#039;  &amp;lt;br&amp;gt;Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [[https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| need to correct]] errors is a potential vulnerability in individuals high in Conscientiousness&amp;lt;ref&amp;gt;[1]&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=499</id>
		<title>High Conscientiousness</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=499"/>
		<updated>2025-10-25T14:55:53Z</updated>

		<summary type="html">&lt;p&gt;Info: /* References: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;High Conscientiousness  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Personality dimension, high attentativeness to detail &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2021-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Big 5 Personality dimension describing how attentative an individual is to detail. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild: Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This need to correct...&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
Halevi, T., Memon, N., &amp;amp; Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=498</id>
		<title>High Conscientiousness</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=High_Conscientiousness&amp;diff=498"/>
		<updated>2025-10-25T14:55:38Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Examples: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;High Conscientiousness  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Personality dimension, high attentativeness to detail &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2021-002 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Big 5 Personality dimension describing how attentative an individual is to detail. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild: Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This need to correct...&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=497</id>
		<title>CognitiveAttackTaxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=497"/>
		<updated>2025-07-14T21:54:55Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ &#039;&#039;&#039;&lt;br /&gt;
== Cognitive Attack Taxonomy ==&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
CAT v2025.1&lt;br /&gt;
© 2025 Cognitive Security Institute. Licensed for non-commercial use under CC BY-NC 4.0.&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=496</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=496"/>
		<updated>2025-02-23T23:39:23Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	 8    	 || 	TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=495</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=495"/>
		<updated>2025-02-23T23:38:44Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	 8    	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=494</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=494"/>
		<updated>2025-02-21T08:45:50Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Hyperstition&amp;diff=493</id>
		<title>Hyperstition</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Hyperstition&amp;diff=493"/>
		<updated>2025-02-21T08:44:45Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Hyperstition */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Hyperstition&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Beliefs that create their own reality. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2024-011 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Operational &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Proof-of-Concept &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  Vulnerability &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; Self-Fulfilling Prophecy &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  Beliefs that create their own reality through dissemination.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039; Misinformation, Disinformation, Malicious Narrative &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039; Uncertainty &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039;  The core idea of hyperstition is that a belief or narrative, once it gains enough traction among a group of people, can bring about the very reality it depicts. Even if the initial belief is unfounded, it becomes &amp;quot;real&amp;quot; due to the actions that the belief motivates. This interaction between belief, behavior, and outcome shows how hyperstitions can materially influence real-world events based on the power of perceptions and expectations&amp;lt;ref&amp;gt;http://cyborganthropology.com/Hyperstition&amp;lt;/ref&amp;gt;. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039; A collective belief that a stock is unstable and likely to collapse, is spread among investors, and becomes a self-fulfilling prophecy. The fictional narrative takes on a life of its own. As investors act on this belief by selling off their shares, the stock price indeed falls, ultimately leading to the stock&#039;s collapse.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039; The viral purchase of toilet paper in retail at the beginning of the Covid-19 pandemic in response to stories of supplies being depleted. The stories of supply scarcity motivated more people to search out and purchase remaining stock.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=492</id>
		<title>CognitiveAttackTaxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=492"/>
		<updated>2025-02-21T08:44:27Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Cognitive Attack Taxonomy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ &#039;&#039;&#039;&lt;br /&gt;
== Cognitive Attack Taxonomy ==&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-011    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Lateral_Phishing&amp;diff=491</id>
		<title>Lateral Phishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Lateral_Phishing&amp;diff=491"/>
		<updated>2025-01-13T17:18:11Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Lateral Phishing   */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Lateral Phishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Exploiting a low-value (ie: low security posture) target inorder to &amp;quot;pivot&amp;quot; to a higher value target. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-028 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Observed in the Wild &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; Pivoting &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Exploiting a low-value (ie: low security posture) target inorder to &amp;quot;pivot&amp;quot; to a higher value target by using the compromised account from &amp;quot;inside&amp;quot; the organization. So that the attacker is using an &amp;quot;internal&amp;quot; email address. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=490</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=490"/>
		<updated>2024-11-19T17:59:03Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Learn how to interpret the Cognitive Attack Taxonomy&#039;&#039;&#039; [[Interpreting the Cognitive Attack Taxonomy|&#039;&#039;&#039;here&#039;&#039;&#039;]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=489</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=489"/>
		<updated>2024-11-19T17:58:39Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ &#039;&#039;&#039;Cognitive Security Institute&#039;&#039;&#039;] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
Learn how to interpret the Cognitive Attack Taxonomy [[Interpreting the Cognitive Attack Taxonomy|here]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=488</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=488"/>
		<updated>2024-11-17T23:39:44Z</updated>

		<summary type="html">&lt;p&gt;Info: /* The Cognitive Attack Taxonomy (CAT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ Cognitive Security Institute] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
Learn how to interpret the Cognitive Attack Taxonomy [[Interpreting the Cognitive Attack Taxonomy|here]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ 												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=487</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Main_Page&amp;diff=487"/>
		<updated>2024-11-17T23:36:37Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;&lt;br /&gt;
= &#039;&#039;&#039;The Cognitive Attack Taxonomy (CAT)&#039;&#039;&#039; =&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;	&lt;br /&gt;
Visit the [https://www.cognitivesecurity.institute/ Cognitive Security Institute] to learn more about cognitive security and related topics!&amp;lt;br&amp;gt;&lt;br /&gt;
Learn how to interpret the Cognitive Attack Taxonomy [[Interpreting the Cognitive Attack Taxonomy|here]].&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Interpreting_the_Cognitive_Attack_Taxonomy&amp;diff=486</id>
		<title>Interpreting the Cognitive Attack Taxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Interpreting_the_Cognitive_Attack_Taxonomy&amp;diff=486"/>
		<updated>2024-11-17T23:28:16Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;&amp;lt;big&amp;gt;Introduction to the Cognitive Attack Taxonomy (CAT)&amp;lt;/big&amp;gt;&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
“Hacking” refers to manipulating objects, systems, processes, or technologies in ways not originally intended to produce outcomes not otherwise achievable, or would be much more difficult to achieve, through conventional means. Extending the concept which was originally used within the model train community, then extended to the programming and software development community, then adapted to the cybersecurity community, may be applied to human and artificial cognitive processes.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Cognitive “hacking” relies upon the ability to repurpose, extend, or misuse functions, which likely evolved or developed for one purpose, and apply these functions toward other purposes. For example, humans developed bi-pedal mobility (the ability to walk) because this provided some evolutionary adaptive advantage (likely hunting), but this ability to consistently balance on two feet can be applied in ways that extend beyond the original purpose. This ability to balance to on two feet can now be “hacked” to balance on a moving skateboard. Riding a skateboard was not the original intention of bipedal mobility, but the art of skateboarding would be much more limited if humans never developed the ability to stand up. While balancing on two feet is not what typically comes to mind when considering cognitive abilities, research in robotics demonstrates the enormous computational challenge of performing such an apparently simple function.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) considers cognitive vulnerabilities, exploits, tactics/techniques, tools, and procedures, relative to cognitive processing in the broadest possible sense within biological (humans and animals) and artificial (embodied and virtual) cognitive systems at all levels. Cognition from this perspective refers to information processing systems, which may, or may not, include awareness, consciousness, or sentience.&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Cognitive Vulnerabilities&#039;&#039;&#039; =&lt;br /&gt;
The term ‘’cognitive vulnerabilities’’ is misleading in that it implies a weakness, but within the context of cognitive security, vulnerabilities should be considered as ‘’potentialities for misuse’’. A computer operating system that is capable of encrypting files for security purposes has an inherent ‘’vulnerability’’ in that this capability may also be weaponized by an adversary for malicious purposes. For example, if the file encryption (intended for enhancing security) is manipulated by a malicious threat actor, then that capability can be used to encrypt the owner’s files while the threat actor holds the decryption key. This activity is sometimes referred to as ‘’ransomware’’. This example demonstrates that beneficial features can often be misused to achieve malicious objectives, hence ‘’weaponized’’. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
An example of how this might apply to human cognition might be found in the Reciprocity Norm, which seems to be universal across all cultures (and may span several species &amp;lt;ref&amp;gt;Two Monkeys Were Paid Unequally: Excerpt from Frans de Waal&#039;s TED Talk, Apr 4, 2013. Available at: https://www.youtube.com/watch?v=meiU6TxysCg&amp;amp;pp=ygUcbW9ua2V5IGdyYXBlIGN1Y3VtYmVyIHVuZmFpcg%3D%3D&amp;lt;/ref&amp;gt;, suggesting that this is a relatively ‘’hard-wired’’ cognitive function. The Reciprocity Norm dictates that one should reciprocate actions that another has taken toward oneself. In other words, if someone does something nice for you, you should do something nice for them; conversely, if they do something unkind to you, you have the implied right to be unkind to them. This norm is also consistent with several game theoretical simulations of the Prisoner’s Dilemma which demonstrate that a “tit-for-tat” is the optimal inter-agent relational strategy. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
From the perspective of social cooperation, the Reciprocity Norm is fundamentally critical to building human culture and society would immediately dissolve without such a norm, thus from this perspective Reciprocity is both critical and extremely beneficial. From the cognitive security perspective, the Reciprocity Norm is viewed as a vulnerability because a threat actor (defined as anyone not being completely transparent in their intentions) may employ an action, such as gift giving to increase the likelihood of receiving something they want in return. In this way that threat actor is “exploiting” the Reciprocity Norm by taking an action to ‘’induce the reciprocity norm’’ within the targeted individual.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Example vulnerability | Magnetoreception | https://en.wikipedia.org/wiki/Magnetoreception   --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Cognitive Exploits&#039;&#039;&#039; =&lt;br /&gt;
Within the field of cybersecurity, an exploit refers to a sequence of commands, a software bug, a “glitch” or malfunction, or maliciously written code, which can be used to cause the targeted system to behave in unprescribed ways, which may or may not lead to damage of the system. Within this context, “an exploit” (as a noun) refers to the specified mechanism the threat actor uses to affect the action of the exploitation, whereas “to exploit” (as a verb) refers to the action of launching the mechanism or taking an action, which sets the exploitation mechanism into action.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
The CAT uses this term of exploitation in a very similar way as it is used in information security. A cognitive exploit is a mechanism to manipulate a cognitive vulnerability (noun), or may be a sequence of actions taken by a threat actor to induce actions or state changes in the cognitive system (verb).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
Returning to the previous example outline under Cognitive Vulnerabilities &amp;lt;!-- [https://csi.wiki/home/index.php/Cognitive_Attack_Taxonomy#Cognitive_Vulnerabilities Cognitive Vulnerabilities]--&amp;gt; above which gave the example of the Reciprocity Norm, the threat actor ‘’exploits’’ the ‘’cognitive vulnerability’’ of the Reciprocity Norm by ‘’inducing reciprocity’’ through the action of giving a gift to the targeted individual. This is exploiting Reciprocity through an action (verb). Over the millennia threat actors in the forms of con artists, politicians, salespeople, marketers, propagandists, and others interested in manipulating people, have developed a broad catalog of tactics, techniques, and procedures (TTPs) designed with the intention of manipulating humans by exploiting cognitive vulnerabilities, in other words ‘’exploits’’ (as a noun). &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Cognitive Tools | Tactics/Techniques | Procedures (T/TTPs)&#039;&#039;&#039; =&lt;br /&gt;
Threat actors no longer need to develop cognitive exploits from scratch. In the first decade of the twenty-first century, the pick-up artist (PUA) community developed what they referred to as “technology”, as a series of techniques which enhanced their probability of success in “picking up” a prospective date. These techniques themselves were not particularly novel in themselves, as was the method of information sharing among the PUA community. This community co-evolved with the widespread adoption of the internet and early versions of social media (message boards). This meant that the community was able to compare notes, share successes or failures, and ‘’most importantly’’ develop a glossary of terms referring to highly specified tactics and techniques (exploits as a noun) which could be used to manipulate their prospective targets through ‘’cognitive vulnerabilities’’. Extending this concept into the larger cognitive security domain, it is possible to identify not only ‘’tactics’’ and ‘’techniques’’, but we may also extend the CAT to include available ‘’tools’’ and ‘’procedures’’.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
The example of gift-giving was mentioned above as a means of exploiting the Reciprocity Norm cognitive vulnerability. Another example of an exploit (exploitation technique) which may be used against this cognitive vulnerability is the Door-In-The-Face technique which involves a threat actor initially presenting a large request that is anticipated to be denied, with the intention of following this up with a smaller request. This technique is effective because it manipulates the perceived sense of fairness between the actors and induces a sense of obligation in the target who now feels the need to cooperate with the threat actor out of a need to reciprocate and maintain the balance of fairness. The Door-In-The-Face technique is effective because it increases the likelihood that the second (less costly) option will be accepted, than if the threat actor presented that option initially.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Cognitive Attack Tools&#039;&#039;&#039; ==&lt;br /&gt;
More to come...&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Cognitive Attack Tactics/Techniques&#039;&#039;&#039; ==&lt;br /&gt;
More to come...&amp;lt;br&amp;gt;&lt;br /&gt;
==== &#039;&#039;&#039;Scams, Cons, and Ruses&#039;&#039;&#039; ====&lt;br /&gt;
More to come...&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Cognitive Attack Procedures&#039;&#039;&#039; ==&lt;br /&gt;
More to come...&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;The  V-E-T Relationship&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
The CAT describes the interlocking relationships between cognitive &#039;&#039;&#039;&#039;&#039;[[Cognitive Vulnerabilities|&amp;lt;big&amp;gt;Vulnerabilities&amp;lt;/big&amp;gt;]]&#039;&#039;&#039;&#039;&#039;, &#039;&#039;&#039;&#039;&#039;[[Cognitive_Exploits|&amp;lt;big&amp;gt;Exploits&amp;lt;/big&amp;gt;]]&#039;&#039;&#039;&#039;&#039;, and &#039;&#039;&#039;&#039;&#039;[[TTPs|&amp;lt;big&amp;gt;T/TTPs&amp;lt;/big&amp;gt;]]&#039;&#039;&#039;&#039;&#039;. These relationships can be used to anticipate attacks (and defenses), for research purposes, threat modeling, and other applications.&amp;lt;br&amp;gt;&lt;br /&gt;
The relationship between cognitive vulnerabilities, exploits, and TTPs should be thought of in terms of the cognitive vulnerabilities being opportunities or potentiality for exploitation, cognitive exploits being the mechanism of exploitation, and TTPs being the methodology that for implementing the exploit. &lt;br /&gt;
&amp;lt;!-- [[File:2D-3D Printed Facial Prosthetics.jpg|thumb|right|alt=Exploiting biometrics with 3D printed facial prosthetics|Exploiting biometrics with 3D printed facial prosthetics]]--&amp;gt;&lt;br /&gt;
Adopting the physical analogy of the process of bolting pieces of metal together; the &#039;&#039;vulnerability&#039;&#039; would be a threaded hole in the metal, the &#039;&#039;exploit&#039;&#039; would be the bolt that fits within that threaded hole, and the wrench to tighten the bolt would be the &#039;&#039;TTP&#039;&#039;.&lt;br /&gt;
This relationship is key to understanding how the taxonomic classes work in concert, if no vulnerability exists, then there is no means to exploit it. For example, many migratory birds have the ability to sense magnetic fields, which they seem to use for navigation. While this ability provides several advantages it also presents a vulnerability which may be &amp;lt;!-- [https://en.wikipedia.org/wiki/File:Effect_of_RF_interference_on_Magnetoreception_in_Birds.svg exploited] --&amp;gt; through the projection of radio frequency interference. Humans lack the same level of magnetic sensitivity as migratory birds and therefor cannot be exploited using the same mechanism.&lt;br /&gt;
&amp;lt;!-- [[File:SportsBallStopSign.jpg|thumb|left|alt=Stop sign misclassified as a &amp;quot;sports ball&amp;quot;.|Stop sign misclassified as a &amp;quot;sports ball&amp;quot; using artistic exploit.]] --&amp;gt;&lt;br /&gt;
Cognitive vulnerabilities are highly context dependent. For example, humans less than 23 to 25 years old have the ability to hear higher frequency sounds than older adults. As a vulnerability, this feature has been exploited by the Mosquito sonic area denial system. The Mosquito emits a loud high-pitched humming sound (similar to the sound that a mosquito makes) which is nearly unbearable to those who can hear it, but inaudible to those who cannot. The Mosquito is thus used to prevent individuals within a specific age range from congregating in areas covered by the Mosquito&#039;s range. This same feature of hearing is leveraged as an exploit in itself by using the same sound frequency to create a ring tone which teenaged adults can hear but older adults (such as school teachers) cannot. This example illustrates how quickly the context for a cognitive vulnerability can shift.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- [[File:RoadPaintingNudge.jpg|thumb|right|alt=Road Painting Nudge|Exploiting drivers&#039; through visual nudging]] --&amp;gt;&lt;br /&gt;
Any information processing system will have inherent cognitive vulnerabilities. These are endemic to a cognitive system and the system will usually cease functioning without them. These vulnerabilities tend to be highly specific to each system. For example, 3d printed facial prosthetics may allow threat actors to bypass biometric algorithms but will not deceive humans for an instant. Likewise, a painted graphic on a stop sign will not a human but may induce a computer vision algorithm to misclassify a stop sign as a &amp;quot;sports ball&amp;quot;. By contrast, a perspective painting of a child chasing a ball into the street may deceive both a human driver and the computer vision algorithm controlling an autonomous vehicle, because these visual cues exploit similar information processing mechanisms in both cognitive systems. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Understanding these relationships improves understanding how cognitive attacks are applied, how they function, and how they might be potentially be &amp;quot;tuned&amp;quot; to particular targets. For example: if a vulnerability is lacking in an individual target or population, then it will be impossible to attack using a specified exploit. &lt;br /&gt;
&lt;br /&gt;
== Examples of V-E-T relationships ==&lt;br /&gt;
To more effectively clarify these relationships, here are a few examples of the relationships.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[File:CAT TEST 1.jpg|frameless|right|alt=CAT TEST 1|CAT TEST 1]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Examples: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Affinity toward Neoteny (Youthful features).&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Exploit:&#039;&#039;&#039; Presentation or display of neotenic Features (Large eyes, large head).&amp;lt;br&amp;gt; &lt;br /&gt;
&#039;&#039;&#039;TTP:&#039;&#039;&#039; Design a robot to look &amp;quot;cute&amp;quot; to lower suspicions by adding neotenic features (such as large eye &amp;amp; head).&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Ability to hear sound within a specified frequency range.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Exploit:&#039;&#039;&#039; Playing sound within that specified frequency range in a aggravating manner.&amp;lt;br&amp;gt; &lt;br /&gt;
&#039;&#039;&#039;TTP:&#039;&#039;&#039; &amp;quot;Mosquito&amp;quot; sonic area denial system.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Need for Commitment and Consistency&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Exploit:&#039;&#039;&#039; Ikea Effect&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;TTP:&#039;&#039;&#039; Foot-in-the-Door technique&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Need to Reciprocate&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Exploit:&#039;&#039;&#039; Inducing Reciprocity&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;TTP:&#039;&#039;&#039; Door-in-the-Face technique (DITF technique is effective because of reciprocal concessions)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Applications of the CAT&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples of Cognitive Attacks&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Proof-of-Concept Examples of Cognitive Attacks&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Real-World Examples of Cognitive Attacks&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Cognitive Attack Graphs&#039;&#039;&#039; ==&lt;br /&gt;
Using the Cognitive Attack Taxonomy, it becomes possible to map attacks which have occurred or attack which may potentially occur in the future. The figure below depicts a SMSishing attack, a social engineering technique which uses SMS messaging to transmit a phishing message. In this example, the threat actors sent the target a SMS message impersonating the target&#039;s bank. This message threatened that the target would be locked out of their account within a short period of time due to a negative balance in their account. Using the &#039;&#039;&#039;&#039;&#039;tactic&#039;&#039;&#039;&#039;&#039; of SMSishing, these threat actors employed the &#039;&#039;&#039;&#039;&#039;techniques&#039;&#039;&#039;&#039;&#039; of &#039;&#039;Account Lockout&#039;&#039; and &#039;&#039;Negative Balance&#039;&#039; to launch the  &#039;&#039;&#039;&#039;&#039;exploits&#039;&#039;&#039;&#039;&#039; of &#039;&#039;Scarcity&#039;&#039; and &#039;&#039;Fear Of Missing Out&#039;&#039; as a means to exploit the &#039;&#039;&#039;&#039;&#039;cognitive vulnerability&#039;&#039;&#039;&#039;&#039; of &#039;&#039;Loss Aversion&#039;&#039;. This system for building Cognitive Attack Graphs is extensible and scalable to accommodate a broad range of cognitive attacks ranging from social engineering, to influence operations, to lawfare, to neuro-attacks, narrative warfare, and others.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[File:SMSishing-Loss Aversion AttackGraph.jpg|frame|center|alt=Cognitive Attack Graph: SMSishing attack threatening account lockout due to a negative balance, employing the exploits of Scarcity and FOMO to exploit the Loss Aversion cognitive vulnerability.|Cognitive Attack Graph: SMSishing attack threatening account lockout due to a negative balance, employing the exploits of Scarcity and FOMO to exploit the Loss Aversion cognitive vulnerability.]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[File:SMSishing-Loss Aversion AttackGraph.png|thumb|alt=SMSishing Graph|SMSishing]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Open Systems Interconnection Model (OSI Model)&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Layer 1-7 (OSI Model)&#039;&#039;&#039; ===&lt;br /&gt;
Introduction to the OSI Model...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 1 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 2 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 3 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 4 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 5 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 6 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 7 ====&lt;br /&gt;
&lt;br /&gt;
===== AI and Large Language Models =====&lt;br /&gt;
Generative AI models, such as large language models (LLMs) reside at OSI Layer 7. According to Chat GPT4...&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;quot;Large Language Models (LLMs) like GPTs (Generative Pre-trained Transformers) operate at the Application Layer (Layer 7) of the OSI model. The Application Layer is the topmost layer that provides interfaces for applications to access network services and defines protocols that applications use to communicate over a network. LLMs and GPTs, being advanced software applications that provide natural language processing capabilities, interact with other software applications and services through the Application Layer. They use protocols defined at this layer to send and receive data over the network, offering services such as text generation, language translation, and content creation that are utilized by end-user applications.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Attacks At Different OSI Layers ====&lt;br /&gt;
&lt;br /&gt;
[[File:OSI Attack Possibilities Table.jpg|none|center|alt=Attack Possibilities by OSI Layer (Layers 1 - 7)|OSI Attack Possibilities Table]]&amp;lt;ref&amp;gt;https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Human Interconnection Model (HIM)&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Layer 8 (HIM)&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Layer 9 (HIM)&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Layer 10 (HIM)&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Scales of Operation&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Tactical&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Operational&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Strategic&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Ethical Concerns&#039;&#039;&#039; ==&lt;br /&gt;
There is a philosophical perspective that advocates against the dissemination of “dark knowledge”; knowledge about ways that evil might be perpetrated or facilitated. This leads to an open debate which should be explored by the CSI community about whether these aspects of cognitive manipulation should be openly explored. A strong argument in favor of exploring these issues is that those intent on committing evil will learn of these tools, tactics, techniques, procedures, and human vulnerabilities without the aid of this reference. If being forewarned is to be forearmed, and knowledge is power, then advocating for the exposure of these vulnerabilities, exploits, and tools to the public may empower the public to anticipate and avoid such attacks.&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;How To Understand the Cognitive Attack Taxonomy&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;CAT Name:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This is the common name to describe the cognitive attack taxonomy (CAT) vulnerability, exploit, or T/TTP (VET).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Short Description:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This is a brief description of the CAT-VET is usually a two to three sentences maximum description of the entry.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;	&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;CAT ID:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Intended to be a unique identifier for the CAT-VET. The prefix &amp;quot;CAT&amp;quot; refers to the Cognitive Attack Taxonomy, followed by the year, and finally the serial number of the CAT-VET. For example, CAT-2021-005 identifies the fifth CAT-VET cataloged in calendar year 2021.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Layer:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This refers to the interconnection layer that the CAT-VET operates through. The Open Systems Interconnection Model (OSI Model) refers to communication between information systems. Layer 1 refers to the physical layer (wires or radio waves) and Layer 7 refers to the application layer at which the connection interfaces with the human user. The Human Interconnection Model (HIM) refers to Layer 8 (human layer), Layer 9 (organizational layer), and Layer 10 (legal layer).&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Layer 7:&#039;&#039;&#039; This is the layer that AI operates through (according to ChatGPT4).&amp;lt;br&amp;gt; &lt;br /&gt;
* &#039;&#039;&#039;Layer 8:&#039;&#039;&#039; The human layer at which heuristics, biases, and other psychological influence techniques operate. Social engineering or influence operations function at this layer.&amp;lt;br&amp;gt; &lt;br /&gt;
* &#039;&#039;&#039;Layer 9:&#039;&#039;&#039; The organizational layer, manipulation techniques at this layer operate through policy functions. &lt;br /&gt;
* &#039;&#039;&#039;Layer 10:&#039;&#039;&#039; The legal layer, manipulation at this layer occurs through legislative processes or court cases.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Operational Scale:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This refers to the &#039;&#039;typical&#039;&#039; or &#039;&#039;expected&#039;&#039; scale this CAT-VET is deployed at. &lt;br /&gt;
* &#039;&#039;&#039;Tactical:&#039;&#039;&#039; These are typically individual encounters with a single attacker and single target. &lt;br /&gt;
* &#039;&#039;&#039;Operational:&#039;&#039;&#039; This level refers to multiple engagements over a period of time, typically involving multiple parties.&lt;br /&gt;
* &#039;&#039;&#039;Strategic:&#039;&#039;&#039; Nation-state or nation-state level actors exercising multiple operations to exert strategic influence objectives.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Level of Maturity:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This header describes the degree to which a vulnerability, exploit, or T/TTPs has been vetted, validated, or established. V-E-Ts exist on a continuum from hypothetical ideas anchoring one extreme with very well established laws human nature occupying the other extreme with a spectrum of support for constructs in between. The Level of Maturity refers to the degree of empirical support that is documented for each V-E-T, and this designation may evolve over time. &lt;br /&gt;
* &#039;&#039;&#039;Theoretical:&#039;&#039;&#039; Unproven CAT-VETs that are feasible but have not yet been proven through a proof-of-concept test nor has been documented in the wild.  &lt;br /&gt;
* &#039;&#039;&#039;Proof-of-Concept:&#039;&#039;&#039; Security researchers commonly discover and report on vulnerabilities, exploits, or techniques. These CAT-VETs have not yet been documented in the wild.  &lt;br /&gt;
* &#039;&#039;&#039;Observed in the Wild:&#039;&#039;&#039; CAT-VETs which have been reported as occurring in a non-laboratory or controlled setting. These reports usually result from criminals employing techniques during the commission of crimes. 	&lt;br /&gt;
* &#039;&#039;&#039;In Common Use:&#039;&#039;&#039; These CAT-VETs are commonly encountered or exploited in uncontrolled environments and are commonly used by criminals and other threat actors.&lt;br /&gt;
* &#039;&#039;&#039;Well-Established:&#039;&#039;&#039; CAT-VETs that are in common use &#039;&#039;and&#039;&#039; are well-documented to be effective.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Category:&amp;lt;/big&amp;gt;&#039;&#039;&#039; The CAT-VET category informs whether an entry is a cognitive vulnerability, cognitive exploit, or is a tactic, technique, tool, or procedure.	&lt;br /&gt;
* &#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Cognitive Vulnerability &lt;br /&gt;
* &#039;&#039;&#039;Exploit:&#039;&#039;&#039; Cognitive Exploit&lt;br /&gt;
* &#039;&#039;&#039;TTP:&#039;&#039;&#039; Cognitive Attack Tactic/Technique, Tool, or Procedure&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Subcategory:&amp;lt;/big&amp;gt;&#039;&#039;&#039; The CAT-VET subcategory refers to the type of vulnerability, exploit, or T/TTP the entry falls within. The subcategory is intended to be expandable as new discoveries are made, while CAT-VET Categories are intended to be immutable.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Also Known As:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Identifies alternative names or adjacent terms and concepts to the entry.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Brief Description:&amp;lt;/big&amp;gt;&#039;&#039;&#039;  This description is intended to be a five words or less description of the entry.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Closely Related Concepts:&amp;lt;/big&amp;gt;&#039;&#039;&#039;  These are concepts which relate to the entry but are not alternative names.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Mechanism:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This describes the operation of the CAT-VET entry. If the entry is a vulnerability, then the mechanisms described will be exploits or T/TTPs. If the entry is an exploit, the mechanisms will include vulnerabilities the exploit may be applied to or T/TTPs which may take advantage of the exploit, alternatively, a T/TTP entry will list cognitive vulnerabilities which it may be applied against or exploits which might be leveraged T/TTP deployment.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Multiplier:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Describes adjacent phenomena which may enhance or degrade the entry. For example, decision fatigue (CAT-2022-050) is a cognitive vulnerability which describes the experience of increasing difficulty in resisting temptation as choices are made. This vulnerability may be enhanced by presenting more closely related alternatives when choosing between alternatives (increasing cognitive load), or degraded by presenting personally relevant information at the key decision point (increasing semantic relevance).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Detailed Description:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This category provides a detailed description of the entry. This section can be as long as needed and is intended to be expandable to allow for new or updated information about the entry.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Use Case Example:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Examples of how the CAT-VET might be used in a hypothetical situation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Example From The Wild:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Example of the CAT-VET has been used in a documented case.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Comments:&amp;lt;/big&amp;gt;&#039;&#039;&#039; General commentary on the CAT entry. Community discussions may exist here in addition to the page discussion notes.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;References:&amp;lt;/big&amp;gt;&#039;&#039;&#039;  All CAT entries are to be backed by references to the maximum practical extent. All entries should be backed by research and/or observations from the wild. The CAT is not intended to be a repository of fantasy or opinion.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;References&#039;&#039;&#039; =&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Interpreting_the_Cognitive_Attack_Taxonomy&amp;diff=485</id>
		<title>Interpreting the Cognitive Attack Taxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Interpreting_the_Cognitive_Attack_Taxonomy&amp;diff=485"/>
		<updated>2024-11-17T23:27:47Z</updated>

		<summary type="html">&lt;p&gt;Info: Created page with &amp;quot;= &amp;#039;&amp;#039;&amp;#039;&amp;lt;big&amp;gt;Introduction to the Cognitive Attack Taxonomy (CAT)&amp;lt;/big&amp;gt;&amp;#039;&amp;#039;&amp;#039; =  “Hacking” refers to manipulating objects, systems, processes, or technologies in ways not originally intended to produce outcomes not otherwise achievable, or would be much more difficult to achieve, through conventional means. Extending the concept which was originally used within the model train community, then extended to the programming and software development community, then adapted to th...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= &#039;&#039;&#039;&amp;lt;big&amp;gt;Introduction to the Cognitive Attack Taxonomy (CAT)&amp;lt;/big&amp;gt;&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
“Hacking” refers to manipulating objects, systems, processes, or technologies in ways not originally intended to produce outcomes not otherwise achievable, or would be much more difficult to achieve, through conventional means. Extending the concept which was originally used within the model train community, then extended to the programming and software development community, then adapted to the cybersecurity community, may be applied to human and artificial cognitive processes.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Cognitive “hacking” relies upon the ability to repurpose, extend, or misuse functions, which likely evolved or developed for one purpose, and apply these functions toward other purposes. For example, humans developed bi-pedal mobility (the ability to walk) because this provided some evolutionary adaptive advantage (likely hunting), but this ability to consistently balance on two feet can be applied in ways that extend beyond the original purpose. This ability to balance to on two feet can now be “hacked” to balance on a moving skateboard. Riding a skateboard was not the original intention of bipedal mobility, but the art of skateboarding would be much more limited if humans never developed the ability to stand up. While balancing on two feet is not what typically comes to mind when considering cognitive abilities, research in robotics demonstrates the enormous computational challenge of performing such an apparently simple function.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Cognitive Attack Taxonomy (CAT) considers cognitive vulnerabilities, exploits, tactics/techniques, tools, and procedures, relative to cognitive processing in the broadest possible sense within biological (humans and animals) and artificial (embodied and virtual) cognitive systems at all levels. Cognition from this perspective refers to information processing systems, which may, or may not, include awareness, consciousness, or sentience.&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Cognitive Vulnerabilities&#039;&#039;&#039; =&lt;br /&gt;
The term ‘’cognitive vulnerabilities’’ is misleading in that it implies a weakness, but within the context of cognitive security, vulnerabilities should be considered as ‘’potentialities for misuse’’. A computer operating system that is capable of encrypting files for security purposes has an inherent ‘’vulnerability’’ in that this capability may also be weaponized by an adversary for malicious purposes. For example, if the file encryption (intended for enhancing security) is manipulated by a malicious threat actor, then that capability can be used to encrypt the owner’s files while the threat actor holds the decryption key. This activity is sometimes referred to as ‘’ransomware’’. This example demonstrates that beneficial features can often be misused to achieve malicious objectives, hence ‘’weaponized’’. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
An example of how this might apply to human cognition might be found in the Reciprocity Norm, which seems to be universal across all cultures (and may span several species &amp;lt;ref&amp;gt;Two Monkeys Were Paid Unequally: Excerpt from Frans de Waal&#039;s TED Talk, Apr 4, 2013. Available at: https://www.youtube.com/watch?v=meiU6TxysCg&amp;amp;pp=ygUcbW9ua2V5IGdyYXBlIGN1Y3VtYmVyIHVuZmFpcg%3D%3D&amp;lt;/ref&amp;gt;, suggesting that this is a relatively ‘’hard-wired’’ cognitive function. The Reciprocity Norm dictates that one should reciprocate actions that another has taken toward oneself. In other words, if someone does something nice for you, you should do something nice for them; conversely, if they do something unkind to you, you have the implied right to be unkind to them. This norm is also consistent with several game theoretical simulations of the Prisoner’s Dilemma which demonstrate that a “tit-for-tat” is the optimal inter-agent relational strategy. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
From the perspective of social cooperation, the Reciprocity Norm is fundamentally critical to building human culture and society would immediately dissolve without such a norm, thus from this perspective Reciprocity is both critical and extremely beneficial. From the cognitive security perspective, the Reciprocity Norm is viewed as a vulnerability because a threat actor (defined as anyone not being completely transparent in their intentions) may employ an action, such as gift giving to increase the likelihood of receiving something they want in return. In this way that threat actor is “exploiting” the Reciprocity Norm by taking an action to ‘’induce the reciprocity norm’’ within the targeted individual.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Example vulnerability | Magnetoreception | https://en.wikipedia.org/wiki/Magnetoreception   --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Cognitive Exploits&#039;&#039;&#039; =&lt;br /&gt;
Within the field of cybersecurity, an exploit refers to a sequence of commands, a software bug, a “glitch” or malfunction, or maliciously written code, which can be used to cause the targeted system to behave in unprescribed ways, which may or may not lead to damage of the system. Within this context, “an exploit” (as a noun) refers to the specified mechanism the threat actor uses to affect the action of the exploitation, whereas “to exploit” (as a verb) refers to the action of launching the mechanism or taking an action, which sets the exploitation mechanism into action.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
The CAT uses this term of exploitation in a very similar way as it is used in information security. A cognitive exploit is a mechanism to manipulate a cognitive vulnerability (noun), or may be a sequence of actions taken by a threat actor to induce actions or state changes in the cognitive system (verb).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
Returning to the previous example outline under Cognitive Vulnerabilities &amp;lt;!-- [https://csi.wiki/home/index.php/Cognitive_Attack_Taxonomy#Cognitive_Vulnerabilities Cognitive Vulnerabilities]--&amp;gt; above which gave the example of the Reciprocity Norm, the threat actor ‘’exploits’’ the ‘’cognitive vulnerability’’ of the Reciprocity Norm by ‘’inducing reciprocity’’ through the action of giving a gift to the targeted individual. This is exploiting Reciprocity through an action (verb). Over the millennia threat actors in the forms of con artists, politicians, salespeople, marketers, propagandists, and others interested in manipulating people, have developed a broad catalog of tactics, techniques, and procedures (TTPs) designed with the intention of manipulating humans by exploiting cognitive vulnerabilities, in other words ‘’exploits’’ (as a noun). &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Cognitive Tools | Tactics/Techniques | Procedures (T/TTPs)&#039;&#039;&#039; =&lt;br /&gt;
Threat actors no longer need to develop cognitive exploits from scratch. In the first decade of the twenty-first century, the pick-up artist (PUA) community developed what they referred to as “technology”, as a series of techniques which enhanced their probability of success in “picking up” a prospective date. These techniques themselves were not particularly novel in themselves, as was the method of information sharing among the PUA community. This community co-evolved with the widespread adoption of the internet and early versions of social media (message boards). This meant that the community was able to compare notes, share successes or failures, and ‘’most importantly’’ develop a glossary of terms referring to highly specified tactics and techniques (exploits as a noun) which could be used to manipulate their prospective targets through ‘’cognitive vulnerabilities’’. Extending this concept into the larger cognitive security domain, it is possible to identify not only ‘’tactics’’ and ‘’techniques’’, but we may also extend the CAT to include available ‘’tools’’ and ‘’procedures’’.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
The example of gift-giving was mentioned above as a means of exploiting the Reciprocity Norm cognitive vulnerability. Another example of an exploit (exploitation technique) which may be used against this cognitive vulnerability is the Door-In-The-Face technique which involves a threat actor initially presenting a large request that is anticipated to be denied, with the intention of following this up with a smaller request. This technique is effective because it manipulates the perceived sense of fairness between the actors and induces a sense of obligation in the target who now feels the need to cooperate with the threat actor out of a need to reciprocate and maintain the balance of fairness. The Door-In-The-Face technique is effective because it increases the likelihood that the second (less costly) option will be accepted, than if the threat actor presented that option initially.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Cognitive Attack Tools&#039;&#039;&#039; ==&lt;br /&gt;
More to come...&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Cognitive Attack Tactics/Techniques&#039;&#039;&#039; ==&lt;br /&gt;
More to come...&amp;lt;br&amp;gt;&lt;br /&gt;
==== &#039;&#039;&#039;Scams, Cons, and Ruses&#039;&#039;&#039; ====&lt;br /&gt;
More to come...&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Cognitive Attack Procedures&#039;&#039;&#039; ==&lt;br /&gt;
More to come...&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;The  V-E-T Relationship&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
The CAT describes the interlocking relationships between cognitive &#039;&#039;&#039;&#039;&#039;[[Cognitive Vulnerabilities|&amp;lt;big&amp;gt;Vulnerabilities&amp;lt;/big&amp;gt;]]&#039;&#039;&#039;&#039;&#039;, &#039;&#039;&#039;&#039;&#039;[[Cognitive_Exploits|&amp;lt;big&amp;gt;Exploits&amp;lt;/big&amp;gt;]]&#039;&#039;&#039;&#039;&#039;, and &#039;&#039;&#039;&#039;&#039;[[TTPs|&amp;lt;big&amp;gt;T/TTPs&amp;lt;/big&amp;gt;]]&#039;&#039;&#039;&#039;&#039;. These relationships can be used to anticipate attacks (and defenses), for research purposes, threat modeling, and other applications.&amp;lt;br&amp;gt;&lt;br /&gt;
The relationship between cognitive vulnerabilities, exploits, and TTPs should be thought of in terms of the cognitive vulnerabilities being opportunities or potentiality for exploitation, cognitive exploits being the mechanism of exploitation, and TTPs being the methodology that for implementing the exploit. &lt;br /&gt;
&amp;lt;!-- [[File:2D-3D Printed Facial Prosthetics.jpg|thumb|right|alt=Exploiting biometrics with 3D printed facial prosthetics|Exploiting biometrics with 3D printed facial prosthetics]]--&amp;gt;&lt;br /&gt;
Adopting the physical analogy of the process of bolting pieces of metal together; the &#039;&#039;vulnerability&#039;&#039; would be a threaded hole in the metal, the &#039;&#039;exploit&#039;&#039; would be the bolt that fits within that threaded hole, and the wrench to tighten the bolt would be the &#039;&#039;TTP&#039;&#039;.&lt;br /&gt;
This relationship is key to understanding how the taxonomic classes work in concert, if no vulnerability exists, then there is no means to exploit it. For example, many migratory birds have the ability to sense magnetic fields, which they seem to use for navigation. While this ability provides several advantages it also presents a vulnerability which may be &amp;lt;!-- [https://en.wikipedia.org/wiki/File:Effect_of_RF_interference_on_Magnetoreception_in_Birds.svg exploited] --&amp;gt; through the projection of radio frequency interference. Humans lack the same level of magnetic sensitivity as migratory birds and therefor cannot be exploited using the same mechanism.&lt;br /&gt;
&amp;lt;!-- [[File:SportsBallStopSign.jpg|thumb|left|alt=Stop sign misclassified as a &amp;quot;sports ball&amp;quot;.|Stop sign misclassified as a &amp;quot;sports ball&amp;quot; using artistic exploit.]] --&amp;gt;&lt;br /&gt;
Cognitive vulnerabilities are highly context dependent. For example, humans less than 23 to 25 years old have the ability to hear higher frequency sounds than older adults. As a vulnerability, this feature has been exploited by the Mosquito sonic area denial system. The Mosquito emits a loud high-pitched humming sound (similar to the sound that a mosquito makes) which is nearly unbearable to those who can hear it, but inaudible to those who cannot. The Mosquito is thus used to prevent individuals within a specific age range from congregating in areas covered by the Mosquito&#039;s range. This same feature of hearing is leveraged as an exploit in itself by using the same sound frequency to create a ring tone which teenaged adults can hear but older adults (such as school teachers) cannot. This example illustrates how quickly the context for a cognitive vulnerability can shift.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- [[File:RoadPaintingNudge.jpg|thumb|right|alt=Road Painting Nudge|Exploiting drivers&#039; through visual nudging]] --&amp;gt;&lt;br /&gt;
Any information processing system will have inherent cognitive vulnerabilities. These are endemic to a cognitive system and the system will usually cease functioning without them. These vulnerabilities tend to be highly specific to each system. For example, 3d printed facial prosthetics may allow threat actors to bypass biometric algorithms but will not deceive humans for an instant. Likewise, a painted graphic on a stop sign will not a human but may induce a computer vision algorithm to misclassify a stop sign as a &amp;quot;sports ball&amp;quot;. By contrast, a perspective painting of a child chasing a ball into the street may deceive both a human driver and the computer vision algorithm controlling an autonomous vehicle, because these visual cues exploit similar information processing mechanisms in both cognitive systems. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Understanding these relationships improves understanding how cognitive attacks are applied, how they function, and how they might be potentially be &amp;quot;tuned&amp;quot; to particular targets. For example: if a vulnerability is lacking in an individual target or population, then it will be impossible to attack using a specified exploit. &lt;br /&gt;
&lt;br /&gt;
== Examples of V-E-T relationships ==&lt;br /&gt;
To more effectively clarify these relationships, here are a few examples of the relationships.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[File:CAT TEST 1.jpg|frameless|right|alt=CAT TEST 1|CAT TEST 1]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Examples: &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Affinity toward Neoteny (Youthful features).&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Exploit:&#039;&#039;&#039; Presentation or display of neotenic Features (Large eyes, large head).&amp;lt;br&amp;gt; &lt;br /&gt;
&#039;&#039;&#039;TTP:&#039;&#039;&#039; Design a robot to look &amp;quot;cute&amp;quot; to lower suspicions by adding neotenic features (such as large eye &amp;amp; head).&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Ability to hear sound within a specified frequency range.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Exploit:&#039;&#039;&#039; Playing sound within that specified frequency range in a aggravating manner.&amp;lt;br&amp;gt; &lt;br /&gt;
&#039;&#039;&#039;TTP:&#039;&#039;&#039; &amp;quot;Mosquito&amp;quot; sonic area denial system.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Need for Commitment and Consistency&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Exploit:&#039;&#039;&#039; Ikea Effect&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;TTP:&#039;&#039;&#039; Foot-in-the-Door technique&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Need to Reciprocate&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Exploit:&#039;&#039;&#039; Inducing Reciprocity&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;TTP:&#039;&#039;&#039; Door-in-the-Face technique (DITF technique is effective because of reciprocal concessions)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Applications of the CAT&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples of Cognitive Attacks&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Proof-of-Concept Examples of Cognitive Attacks&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Real-World Examples of Cognitive Attacks&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Cognitive Attack Graphs&#039;&#039;&#039; ==&lt;br /&gt;
Using the Cognitive Attack Taxonomy, it becomes possible to map attacks which have occurred or attack which may potentially occur in the future. The figure below depicts a SMSishing attack, a social engineering technique which uses SMS messaging to transmit a phishing message. In this example, the threat actors sent the target a SMS message impersonating the target&#039;s bank. This message threatened that the target would be locked out of their account within a short period of time due to a negative balance in their account. Using the &#039;&#039;&#039;&#039;&#039;tactic&#039;&#039;&#039;&#039;&#039; of SMSishing, these threat actors employed the &#039;&#039;&#039;&#039;&#039;techniques&#039;&#039;&#039;&#039;&#039; of &#039;&#039;Account Lockout&#039;&#039; and &#039;&#039;Negative Balance&#039;&#039; to launch the  &#039;&#039;&#039;&#039;&#039;exploits&#039;&#039;&#039;&#039;&#039; of &#039;&#039;Scarcity&#039;&#039; and &#039;&#039;Fear Of Missing Out&#039;&#039; as a means to exploit the &#039;&#039;&#039;&#039;&#039;cognitive vulnerability&#039;&#039;&#039;&#039;&#039; of &#039;&#039;Loss Aversion&#039;&#039;. This system for building Cognitive Attack Graphs is extensible and scalable to accommodate a broad range of cognitive attacks ranging from social engineering, to influence operations, to lawfare, to neuro-attacks, narrative warfare, and others.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[File:SMSishing-Loss Aversion AttackGraph.jpg|frame|center|alt=Cognitive Attack Graph: SMSishing attack threatening account lockout due to a negative balance, employing the exploits of Scarcity and FOMO to exploit the Loss Aversion cognitive vulnerability.|Cognitive Attack Graph: SMSishing attack threatening account lockout due to a negative balance, employing the exploits of Scarcity and FOMO to exploit the Loss Aversion cognitive vulnerability.]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[File:SMSishing-Loss Aversion AttackGraph.png|thumb|alt=SMSishing Graph|SMSishing]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Open Systems Interconnection Model (OSI Model)&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Layer 1-7 (OSI Model)&#039;&#039;&#039; ===&lt;br /&gt;
Introduction to the OSI Model...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 1 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 2 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 3 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 4 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 5 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 6 ====&lt;br /&gt;
&lt;br /&gt;
==== OSI Layer 7 ====&lt;br /&gt;
&lt;br /&gt;
===== AI and Large Language Models =====&lt;br /&gt;
Generative AI models, such as large language models (LLMs) reside at OSI Layer 7. According to Chat GPT4...&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;quot;Large Language Models (LLMs) like GPTs (Generative Pre-trained Transformers) operate at the Application Layer (Layer 7) of the OSI model. The Application Layer is the topmost layer that provides interfaces for applications to access network services and defines protocols that applications use to communicate over a network. LLMs and GPTs, being advanced software applications that provide natural language processing capabilities, interact with other software applications and services through the Application Layer. They use protocols defined at this layer to send and receive data over the network, offering services such as text generation, language translation, and content creation that are utilized by end-user applications.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== Attacks At Different OSI Layers ====&lt;br /&gt;
&lt;br /&gt;
[[File:OSI Attack Possibilities Table.jpg|none|center|alt=Attack Possibilities by OSI Layer (Layers 1 - 7)|OSI Attack Possibilities Table]]&amp;lt;ref&amp;gt;https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Human Interconnection Model (HIM)&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Layer 8 (HIM)&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Layer 9 (HIM)&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Layer 10 (HIM)&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Scales of Operation&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Tactical&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Operational&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Strategic&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Ethical Concerns&#039;&#039;&#039; ==&lt;br /&gt;
There is a philosophical perspective that advocates against the dissemination of “dark knowledge”; knowledge about ways that evil might be perpetrated or facilitated. This leads to an open debate which should be explored by the CSI community about whether these aspects of cognitive manipulation should be openly explored. A strong argument in favor of exploring these issues is that those intent on committing evil will learn of these tools, tactics, techniques, procedures, and human vulnerabilities without the aid of this reference. If being forewarned is to be forearmed, and knowledge is power, then advocating for the exposure of these vulnerabilities, exploits, and tools to the public may empower the public to anticipate and avoid such attacks.&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;How To Understand the Cognitive Attack Taxonomy&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;CAT Name:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This is the common name to describe the cognitive attack taxonomy (CAT) vulnerability, exploit, or T/TTP (VET).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Short Description:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This is a brief description of the CAT-VET is usually a two to three sentences maximum description of the entry.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;	&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;CAT ID:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Intended to be a unique identifier for the CAT-VET. The prefix &amp;quot;CAT&amp;quot; refers to the Cognitive Attack Taxonomy, followed by the year, and finally the serial number of the CAT-VET. For example, CAT-2021-005 identifies the fifth CAT-VET cataloged in calendar year 2021.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Layer:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This refers to the interconnection layer that the CAT-VET operates through. The Open Systems Interconnection Model (OSI Model) refers to communication between information systems. Layer 1 refers to the physical layer (wires or radio waves) and Layer 7 refers to the application layer at which the connection interfaces with the human user. The Human Interconnection Model (HIM) refers to Layer 8 (human layer), Layer 9 (organizational layer), and Layer 10 (legal layer).&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Layer 7:&#039;&#039;&#039; This is the layer that AI operates through (according to ChatGPT4).&amp;lt;br&amp;gt; &lt;br /&gt;
* &#039;&#039;&#039;Layer 8:&#039;&#039;&#039; The human layer at which heuristics, biases, and other psychological influence techniques operate. Social engineering or influence operations function at this layer.&amp;lt;br&amp;gt; &lt;br /&gt;
* &#039;&#039;&#039;Layer 9:&#039;&#039;&#039; The organizational layer, manipulation techniques at this layer operate through policy functions. &lt;br /&gt;
* &#039;&#039;&#039;Layer 10:&#039;&#039;&#039; The legal layer, manipulation at this layer occurs through legislative processes or court cases.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Operational Scale:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This refers to the &#039;&#039;typical&#039;&#039; or &#039;&#039;expected&#039;&#039; scale this CAT-VET is deployed at. &lt;br /&gt;
* &#039;&#039;&#039;Tactical:&#039;&#039;&#039; These are typically individual encounters with a single attacker and single target. &lt;br /&gt;
* &#039;&#039;&#039;Operational:&#039;&#039;&#039; This level refers to multiple engagements over a period of time, typically involving multiple parties.&lt;br /&gt;
* &#039;&#039;&#039;Strategic:&#039;&#039;&#039; Nation-state or nation-state level actors exercising multiple operations to exert strategic influence objectives.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Level of Maturity:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This header describes the degree to which a vulnerability, exploit, or T/TTPs has been vetted, validated, or established. V-E-Ts exist on a continuum from hypothetical ideas anchoring one extreme with very well established laws human nature occupying the other extreme with a spectrum of support for constructs in between. The Level of Maturity refers to the degree of empirical support that is documented for each V-E-T, and this designation may evolve over time. &lt;br /&gt;
* &#039;&#039;&#039;Theoretical:&#039;&#039;&#039; Unproven CAT-VETs that are feasible but have not yet been proven through a proof-of-concept test nor has been documented in the wild.  &lt;br /&gt;
* &#039;&#039;&#039;Proof-of-Concept:&#039;&#039;&#039; Security researchers commonly discover and report on vulnerabilities, exploits, or techniques. These CAT-VETs have not yet been documented in the wild.  &lt;br /&gt;
* &#039;&#039;&#039;Observed in the Wild:&#039;&#039;&#039; CAT-VETs which have been reported as occurring in a non-laboratory or controlled setting. These reports usually result from criminals employing techniques during the commission of crimes. 	&lt;br /&gt;
* &#039;&#039;&#039;In Common Use:&#039;&#039;&#039; These CAT-VETs are commonly encountered or exploited in uncontrolled environments and are commonly used by criminals and other threat actors.&lt;br /&gt;
* &#039;&#039;&#039;Well-Established:&#039;&#039;&#039; CAT-VETs that are in common use &#039;&#039;and&#039;&#039; are well-documented to be effective.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Category:&amp;lt;/big&amp;gt;&#039;&#039;&#039; The CAT-VET category informs whether an entry is a cognitive vulnerability, cognitive exploit, or is a tactic, technique, tool, or procedure.	&lt;br /&gt;
* &#039;&#039;&#039;Vulnerability:&#039;&#039;&#039; Cognitive Vulnerability &lt;br /&gt;
* &#039;&#039;&#039;Exploit:&#039;&#039;&#039; Cognitive Exploit&lt;br /&gt;
* &#039;&#039;&#039;TTP:&#039;&#039;&#039; Cognitive Attack Tactic/Technique, Tool, or Procedure&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Subcategory:&amp;lt;/big&amp;gt;&#039;&#039;&#039; The CAT-VET subcategory refers to the type of vulnerability, exploit, or T/TTP the entry falls within. The subcategory is intended to be expandable as new discoveries are made, while CAT-VET Categories are intended to be immutable.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Also Known As:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Identifies alternative names or adjacent terms and concepts to the entry.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Brief Description:&amp;lt;/big&amp;gt;&#039;&#039;&#039;  This description is intended to be a five words or less description of the entry.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Closely Related Concepts:&amp;lt;/big&amp;gt;&#039;&#039;&#039;  These are concepts which relate to the entry but are not alternative names.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Mechanism:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This describes the operation of the CAT-VET entry. If the entry is a vulnerability, then the mechanisms described will be exploits or T/TTPs. If the entry is an exploit, the mechanisms will include vulnerabilities the exploit may be applied to or T/TTPs which may take advantage of the exploit, alternatively, a T/TTP entry will list cognitive vulnerabilities which it may be applied against or exploits which might be leveraged T/TTP deployment.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Multiplier:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Describes adjacent phenomena which may enhance or degrade the entry. For example, decision fatigue (CAT-2022-050) is a cognitive vulnerability which describes the experience of increasing difficulty in resisting temptation as choices are made. This vulnerability may be enhanced by presenting more closely related alternatives when choosing between alternatives (increasing cognitive load), or degraded by presenting personally relevant information at the key decision point (increasing semantic relevance).&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Detailed Description:&amp;lt;/big&amp;gt;&#039;&#039;&#039; This category provides a detailed description of the entry. This section can be as long as needed and is intended to be expandable to allow for new or updated information about the entry.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Use Case Example:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Examples of how the CAT-VET might be used in a hypothetical situation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Example From The Wild:&amp;lt;/big&amp;gt;&#039;&#039;&#039; Example of the CAT-VET has been used in a documented case.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;Comments:&amp;lt;/big&amp;gt;&#039;&#039;&#039; General commentary on the CAT entry. Community discussions may exist here in addition to the page discussion notes.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;big&amp;gt;References:&amp;lt;/big&amp;gt;&#039;&#039;&#039;  All CAT entries are to be backed by references to the maximum practical extent. All entries should be backed by research and/or observations from the wild. The CAT is not intended to be a repository of fantasy or opinion.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;References&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Using Media Wiki ==&lt;br /&gt;
&lt;br /&gt;
Consult the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents User&#039;s Guide] for information on using the wiki software.&lt;br /&gt;
* [[CAT HOW TO EDIT GUIDE]]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ]&lt;br /&gt;
* [https://lists.wikimedia.org/postorius/lists/mediawiki-announce.lists.wikimedia.org/ MediaWiki release mailing list]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language]&lt;br /&gt;
* [https://www.mediawiki.org/wiki/Special:MyLanguage/Manual:Combating_spam Learn how to combat spam on your wiki]&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=484</id>
		<title>CognitiveAttackTaxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=484"/>
		<updated>2024-11-16T21:19:35Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ &#039;&#039;&#039;&lt;br /&gt;
== Cognitive Attack Taxonomy ==&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=483</id>
		<title>Phishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=483"/>
		<updated>2024-11-11T03:11:43Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Phishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using email to deceive a target into downloading malware or revealing sensitive information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-132 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
Distraction: [[Distracted Approach-Distraction]] (CAT-2022-191) users who are distracted or who have their attention directed toward another task or object are more susceptible to phishing attempts. &lt;br /&gt;
&lt;br /&gt;
Mobile Device Usage: Research indicates that using a mobile device can make an individual MORE susceptible to clicking malicious links&amp;lt;ref&amp;gt;Zhuo, S., Biddle, R., Betts, L., Arachchilage, N. A. G., Koh, Y. S., Lottridge, D., &amp;amp; Russello, G. (2023). What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. https://arxiv.org/abs/2304.00664&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Fraudulent attempt to obtain sensitive information from a target, or convince a target to download malware, by impersonating a trustworthy entity. This is typically carried out using email as the communication medium. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
[[Authority]]: Impersonating an authority figure and imposing authoritarian tactics is among the most common phishing tactics because it is a very effective cognitive exploit. &lt;br /&gt;
&lt;br /&gt;
[[Reciprocation]]: Attempting to invoke reciprocity in the target of a phishing attempt has been documented in some phishing emails&amp;lt;ref&amp;gt;Zielinska, O. A., Welk, A. K., Mayhorn, C. B., &amp;amp; Murphy-Hill, E. (2016, September). A temporal analysis of persuasion principles in phishing emails. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 60, No. 1, pp. 765-769). Sage CA: Los Angeles, CA: SAGE Publications. https://journals.sagepub.com/doi/abs/10.1177/1541931213601175&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[Excitement-Appeal to|Excitement]]: Scammers often appeal to excitement as a means of compelling a target to click a link or download malware. &lt;br /&gt;
&lt;br /&gt;
[[Misdirection-Distraction|Misdirection]]: Phishers commonly use logos or prominent features in emails as a means of misdirection as well as a means of establishing legitimacy.&lt;br /&gt;
&lt;br /&gt;
[[Pre-Suasion]]: Scammers can enhance the effectiveness of phishing emails by employing pre-suasion techniques such as the [[Unfinished-Magnetizer|Unfinished]], [[Mystery Magnetizer|Mystery]], or [[Self-Relevance-Magnetizer|Self-Relevance]] magnetizers&amp;lt;ref&amp;gt;Cialdini, R. (2016). Pre-suasion. Simon &amp;amp; Schuster.&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
[[Narrative Influence]]: Phishing emails can significantly enhance effectiveness by playing into a narrative. Some research suggests that when the narrative of a phishing email is highly aligned with user expectations, it may cause the receiver to ignore or explain away warning cues that an email might be malicious&amp;lt;ref&amp;gt;Greene, K. K., Steves, M., Theofanos, M., &amp;amp; Kostick, J. (2018, February). User context: an explanatory variable in phishing susceptibility. In in Proc. 2018 Workshop Usable Security. https://www.ndss-symposium.org/wp-content/uploads/2018/07/usec2018_01-2_Greene_paper.pdf&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[Assistance Ploy|Assistance]]: Phishing emails sometimes very effectively impersonate employees seeking assistance as the email pretext.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=482</id>
		<title>Phishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=482"/>
		<updated>2024-11-11T03:06:29Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Phishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using email to deceive a target into downloading malware or revealing sensitive information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-132 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
Distraction: [[Distracted Approach-Distraction]] (CAT-2022-191) users who are distracted or who have their attention directed toward another task or object are more susceptible to phishing attempts. &lt;br /&gt;
&lt;br /&gt;
Mobile Device Usage: Research indicates that using a mobile device can make an individual MORE susceptible to clicking malicious links&amp;lt;ref&amp;gt;Zhuo, S., Biddle, R., Betts, L., Arachchilage, N. A. G., Koh, Y. S., Lottridge, D., &amp;amp; Russello, G. (2023). What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. https://arxiv.org/abs/2304.00664&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Fraudulent attempt to obtain sensitive information from a target, or convince a target to download malware, by impersonating a trustworthy entity. This is typically carried out using email as the communication medium. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
[[Authority]]: Impersonating an authority figure and imposing authoritarian tactics is among the most common phishing tactics because it is a very effective cognitive exploit. &lt;br /&gt;
&lt;br /&gt;
[[Reciprocation]]: Attempting to invoke reciprocity in the target of a phishing attempt has been documented in some phishing emails&amp;lt;ref&amp;gt;Zielinska, O. A., Welk, A. K., Mayhorn, C. B., &amp;amp; Murphy-Hill, E. (2016, September). A temporal analysis of persuasion principles in phishing emails. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 60, No. 1, pp. 765-769). Sage CA: Los Angeles, CA: SAGE Publications. https://journals.sagepub.com/doi/abs/10.1177/1541931213601175&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[Excitement-Appeal to|Excitement]]: Scammers often appeal to excitement as a means of compelling a target to click a link or download malware. &lt;br /&gt;
&lt;br /&gt;
[[Misdirection-Distraction|Misdirection]]: Phishers commonly use logos or prominent features in emails as a means of misdirection as well as a means of establishing legitimacy.&lt;br /&gt;
&lt;br /&gt;
[[Pre-Suasion]]]: Scammers can enhance the effectiveness of phishing emails by employing pre-suasion techniques such as the [[Unfinished-Magnetizer|Unfinished]], [[Mystery Magnetizer|Mystery]], or [[Self-Relevance-Magnetizer|Self-Relevance]] magnetizers. &lt;br /&gt;
&lt;br /&gt;
[[Narrative Influence]]: Phishing emails can significantly enhance effectiveness by playing into a narrative. Some research suggests that when the narrative of a phishing email is highly aligned with user expectations, it may cause the receiver to ignore or explain away warning cues that an email might be malicious&amp;lt;ref&amp;gt;Greene, K. K., Steves, M., Theofanos, M., &amp;amp; Kostick, J. (2018, February). User context: an explanatory variable in phishing susceptibility. In in Proc. 2018 Workshop Usable Security. https://www.ndss-symposium.org/wp-content/uploads/2018/07/usec2018_01-2_Greene_paper.pdf&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[Assistance Ploy|Assistance]]: Phishing emails sometimes very effectively impersonate employees seeking assistance as the email pretext.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=481</id>
		<title>Phishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=481"/>
		<updated>2024-11-11T02:59:25Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Phishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using email to deceive a target into downloading malware or revealing sensitive information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-132 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
Distraction: [[Distracted Approach-Distraction]] (CAT-2022-191) users who are distracted or who have their attention directed toward another task or object are more susceptible to phishing attempts. &lt;br /&gt;
&lt;br /&gt;
Mobile Device Usage: Research indicates that using a mobile device can make an individual MORE susceptible to clicking malicious links&amp;lt;ref&amp;gt;Zhuo, S., Biddle, R., Betts, L., Arachchilage, N. A. G., Koh, Y. S., Lottridge, D., &amp;amp; Russello, G. (2023). What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. https://arxiv.org/abs/2304.00664&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Fraudulent attempt to obtain sensitive information from a target, or convince a target to download malware, by impersonating a trustworthy entity. This is typically carried out using email as the communication medium. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
[[Authority]]: Impersonating an authority figure and imposing authoritarian tactics is among the most common phishing tactics because it is a very effective cognitive exploit. &lt;br /&gt;
&lt;br /&gt;
[[Reciprocation]]: Attempting to invoke reciprocity in the target of a phishing attempt has been documented in some phishing emails&amp;lt;ref&amp;gt;Zielinska, O. A., Welk, A. K., Mayhorn, C. B., &amp;amp; Murphy-Hill, E. (2016, September). A temporal analysis of persuasion principles in phishing emails. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 60, No. 1, pp. 765-769). Sage CA: Los Angeles, CA: SAGE Publications. https://journals.sagepub.com/doi/abs/10.1177/1541931213601175&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[Excitement-Appeal to|Excitement]]: Scammers often appeal to excitement as a means of compelling a target to click a link or download malware. &lt;br /&gt;
&lt;br /&gt;
[[Misdirection-Distraction|Misdirection]]: Phishers commonly use logos or prominent features in emails as a means of misdirection as well as a means of establishing legitimacy.&lt;br /&gt;
&lt;br /&gt;
[[Pre-Suasion]]]: Scammers can enhance the effectiveness of phishing emails by employing pre-suasion techniques such as the [[Unfinished-Magnetizer|Unfinished]], [[Mystery Magnetizer|Mystery]], or [[Self-Relevance-Magnetizer|Self-Relevance]] magnetizers. &lt;br /&gt;
&lt;br /&gt;
[[Narrative Influence]]: Phishing emails can significantly enhance effectiveness by playing into a narrative.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=480</id>
		<title>Phishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=480"/>
		<updated>2024-11-11T02:51:50Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Phishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using email to deceive a target into downloading malware or revealing sensitive information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-132 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
Distraction: [[Distracted Approach-Distraction]] (CAT-2022-191) users who are distracted or who have their attention directed toward another task or object are more susceptible to phishing attempts. &lt;br /&gt;
&lt;br /&gt;
Mobile Device Usage: Research indicates that using a mobile device can make an individual MORE susceptible to clicking malicious links&amp;lt;ref&amp;gt;Zhuo, S., Biddle, R., Betts, L., Arachchilage, N. A. G., Koh, Y. S., Lottridge, D., &amp;amp; Russello, G. (2023). What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. https://arxiv.org/abs/2304.00664&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Fraudulent attempt to obtain sensitive information from a target, or convince a target to download malware, by impersonating a trustworthy entity. This is typically carried out using email as the communication medium. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
[[Authority]]: Impersonating an authority figure and imposing authoritarian tactics is among the most common phishing tactics because it is a very effective cognitive exploit. &lt;br /&gt;
&lt;br /&gt;
[[Reciprocation]]: Attempting to invoke reciprocity in the target of a phishing attempt has been documented in some phishing emails&amp;lt;ref&amp;gt;Zielinska, O. A., Welk, A. K., Mayhorn, C. B., &amp;amp; Murphy-Hill, E. (2016, September). A temporal analysis of persuasion principles in phishing emails. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 60, No. 1, pp. 765-769). Sage CA: Los Angeles, CA: SAGE Publications. https://journals.sagepub.com/doi/abs/10.1177/1541931213601175&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[Excitement-Appeal to|Excitement]]: Scammers often appeal to excitement as a means of compelling a target to click a link or download malware. &lt;br /&gt;
&lt;br /&gt;
[[Misdirection-Distraction|Misdirection]]: Phishers commonly use logos or prominent features in emails as a means of misdirection as well as a means of establishing legitimacy.&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=479</id>
		<title>CognitiveAttackTaxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=479"/>
		<updated>2024-11-11T02:35:28Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ &#039;&#039;&#039;Cognitive Attack Taxonomy&#039;&#039;&#039;&amp;lt;br&amp;gt;												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-01    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=478</id>
		<title>Phishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=478"/>
		<updated>2024-11-11T02:31:14Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Phishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using email to deceive a target into downloading malware or revealing sensitive information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-132 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039; &amp;lt;br&amp;gt;&lt;br /&gt;
Distraction: [[Distracted Approach-Distraction]] (CAT-2022-191) users who are distracted or who have their attention directed toward another task or object are more susceptible to phishing attempts. &lt;br /&gt;
&lt;br /&gt;
Mobile Device Usage: Research indicates that using a mobile device can make an individual MORE susceptible to clicking malicious links&amp;lt;ref&amp;gt;Zhuo, S., Biddle, R., Betts, L., Arachchilage, N. A. G., Koh, Y. S., Lottridge, D., &amp;amp; Russello, G. (2023). What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. https://arxiv.org/abs/2304.00664&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Fraudulent attempt to obtain sensitive information from a target, or convince a target to download malware, by impersonating a trustworthy entity. This is typically carried out using email as the communication medium. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=QRishing&amp;diff=477</id>
		<title>QRishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=QRishing&amp;diff=477"/>
		<updated>2024-11-11T00:25:07Z</updated>

		<summary type="html">&lt;p&gt;Info: /* QRishing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;QRishing&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Phishing variant employing QR codes&amp;lt;ref&amp;gt;Schlienger, T., Teufel, S., &amp;amp; Wolff, C. (2013). QRishing: The susceptibility of smartphone users to QR code phishing attacks. In M. Bezzi, P. Dupré, &amp;amp; D. Naccache (Eds.), Emerging Security Information, Systems and Technologies (pp. 80-87). Springer. https://doi.org/10.1007/978-3-642-41320-9_4&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L. F., &amp;amp; Christin, N. (2013). QRishing: The susceptibility of smartphone users to QR code phishing attacks. In Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers 17 (pp. 52-69). Springer Berlin Heidelberg. https://kilthub.cmu.edu/articles/journal_contribution/QRishing_The_Susceptibility_of_Smartphone_Users_to_QR_Code_Phishing_Attacks_CMU-CyLab-12-022_/6468011?file=11896547&amp;lt;/ref&amp;gt;. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2024-011 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; Quishing &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  Mobile device users have been found to be more likely to click on masked links compared to traditional computing systems &amp;lt;ref&amp;gt;Almukaynizi, M., Redmiles, E. M., &amp;amp; Rader, E. (2023). What you see is not what you get: The role of email presentation in phishing susceptibility. Proceedings of the ACM on Human-Computer Interaction, 7(CSCW1), Article 2. https://doi.org/10.1145/3579618&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Threat actors create QR codes that redirect to malicious sites impersonating legitimate sites&amp;lt;ref&amp;gt;https://blog.knowbe4.com/qr-code-phishing-is-growing-more-sophisticated&amp;lt;/ref&amp;gt;.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: [[Misdirection-Distraction]] (Exploit, CAT-2022-014)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=476</id>
		<title>Phishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=476"/>
		<updated>2024-11-11T00:17:33Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Phishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using email to deceive a target into downloading malware or revealing sensitive information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-132 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039; Research indicates that using a mobile device can make an individual MORE susceptible to clicking malicious links&amp;lt;ref&amp;gt;Zhuo, S., Biddle, R., Betts, L., Arachchilage, N. A. G., Koh, Y. S., Lottridge, D., &amp;amp; Russello, G. (2023). What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. https://arxiv.org/abs/2304.00664&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Fraudulent attempt to obtain sensitive information from a target, or convince a target to download malware, by impersonating a trustworthy entity. This is typically carried out using email as the communication medium. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=475</id>
		<title>Phishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=Phishing&amp;diff=475"/>
		<updated>2024-11-11T00:16:54Z</updated>

		<summary type="html">&lt;p&gt;Info: /* Description: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Phishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Using email to deceive a target into downloading malware or revealing sensitive information. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2022-132 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; Well-Established &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Brief Description:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039; Research indicates that using a mobile device can make an individual MORE susceptible to clicking malicious links&amp;lt;ref&amp;gt;Zhuo, S., Biddle, R., Betts, L., Arachchilage, N. A. G., Koh, Y. S., Lottridge, D., &amp;amp; Russello, G. (2023). What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. arXiv preprint arXiv:2304.00664. https://arxiv.org/abs/2304.00664&amp;lt;/ref&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Fraudulent attempt to obtain sensitive information from a target, or convince a target to download malware, by impersonating a trustworthy entity. This is typically carried out using email as the communication medium. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]:  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=QRishing&amp;diff=474</id>
		<title>QRishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=QRishing&amp;diff=474"/>
		<updated>2024-11-06T21:07:32Z</updated>

		<summary type="html">&lt;p&gt;Info: /* QRishing (aka Quishing)  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;QRishing&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Phishing variant employing QR codes&amp;lt;ref&amp;gt;Schlienger, T., Teufel, S., &amp;amp; Wolff, C. (2013). QRishing: The susceptibility of smartphone users to QR code phishing attacks. In M. Bezzi, P. Dupré, &amp;amp; D. Naccache (Eds.), Emerging Security Information, Systems and Technologies (pp. 80-87). Springer. https://doi.org/10.1007/978-3-642-41320-9_4&amp;lt;/ref&amp;gt;. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2024-011 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039; Quishing &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  Mobile device users have been found to be more likely to click on masked links compared to traditional computing systems &amp;lt;ref&amp;gt;Almukaynizi, M., Redmiles, E. M., &amp;amp; Rader, E. (2023). What you see is not what you get: The role of email presentation in phishing susceptibility. Proceedings of the ACM on Human-Computer Interaction, 7(CSCW1), Article 2. https://doi.org/10.1145/3579618&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Threat actors create QR codes that redirect to malicious sites impersonating legitimate sites&amp;lt;ref&amp;gt;https://blog.knowbe4.com/qr-code-phishing-is-growing-more-sophisticated&amp;lt;/ref&amp;gt;.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: [[Misdirection-Distraction]] (Exploit, CAT-2022-014)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=QRishing&amp;diff=473</id>
		<title>QRishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=QRishing&amp;diff=473"/>
		<updated>2024-11-06T21:06:40Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;QRishing (aka Quishing) &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Phishing variant employing QR codes&amp;lt;ref&amp;gt;Schlienger, T., Teufel, S., &amp;amp; Wolff, C. (2013). QRishing: The susceptibility of smartphone users to QR code phishing attacks. In M. Bezzi, P. Dupré, &amp;amp; D. Naccache (Eds.), Emerging Security Information, Systems and Technologies (pp. 80-87). Springer. https://doi.org/10.1007/978-3-642-41320-9_4&amp;lt;/ref&amp;gt;. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2024-011 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  Mobile device users have been found to be more likely to click on masked links compared to traditional computing systems &amp;lt;ref&amp;gt;Almukaynizi, M., Redmiles, E. M., &amp;amp; Rader, E. (2023). What you see is not what you get: The role of email presentation in phishing susceptibility. Proceedings of the ACM on Human-Computer Interaction, 7(CSCW1), Article 2. https://doi.org/10.1145/3579618&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Threat actors create QR codes that redirect to malicious sites impersonating legitimate sites&amp;lt;ref&amp;gt;https://blog.knowbe4.com/qr-code-phishing-is-growing-more-sophisticated&amp;lt;/ref&amp;gt;.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: [[Misdirection-Distraction]] (Exploit, CAT-2022-014)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=472</id>
		<title>CognitiveAttackTaxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=472"/>
		<updated>2024-11-06T21:06:05Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ &#039;&#039;&#039;Cognitive Attack Taxonomy&#039;&#039;&#039;&amp;lt;br&amp;gt;												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-01    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory_Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=QRishing&amp;diff=471</id>
		<title>QRishing</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=QRishing&amp;diff=471"/>
		<updated>2024-11-06T07:01:28Z</updated>

		<summary type="html">&lt;p&gt;Info: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;Quishing  &amp;#039;&amp;#039;&amp;#039; ==  &amp;#039;&amp;#039;&amp;#039;Short Description:&amp;#039;&amp;#039;&amp;#039;  Phishing variant employing QR codes&amp;lt;ref&amp;gt;Schlienger, T., Teufel, S., &amp;amp; Wolff, C. (2013). QRishing: The susceptibility of smartphone users to QR code phishing attacks. In M. Bezzi, P. Dupré, &amp;amp; D. Naccache (Eds.), Emerging Security Information, Systems and Technologies (pp. 80-87). Springer. https://doi.org/10.1007/978-3-642-41320-9_4&amp;lt;/ref&amp;gt;. &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;CAT ID:&amp;#039;&amp;#039;&amp;#039; CAT-2024-011 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Layer:&amp;#039;&amp;#039;&amp;#039;  8 &amp;lt;br&amp;gt;  &amp;#039;&amp;#039;&amp;#039;Operational Scale:&amp;#039;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Quishing  &#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Short Description:&#039;&#039;&#039;  Phishing variant employing QR codes&amp;lt;ref&amp;gt;Schlienger, T., Teufel, S., &amp;amp; Wolff, C. (2013). QRishing: The susceptibility of smartphone users to QR code phishing attacks. In M. Bezzi, P. Dupré, &amp;amp; D. Naccache (Eds.), Emerging Security Information, Systems and Technologies (pp. 80-87). Springer. https://doi.org/10.1007/978-3-642-41320-9_4&amp;lt;/ref&amp;gt;. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CAT ID:&#039;&#039;&#039; CAT-2024-011 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Layer:&#039;&#039;&#039;  8 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Operational Scale:&#039;&#039;&#039; Tactical &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level of Maturity:&#039;&#039;&#039; In Common Use &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Category:&#039;&#039;&#039;  TTP &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Subcategory:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Also Known As:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Description:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Closely Related Concepts:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mechanism:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multipliers:&#039;&#039;&#039;  Mobile device users have been found to be more likely to click on masked links compared to traditional computing systems &amp;lt;ref&amp;gt;Almukaynizi, M., Redmiles, E. M., &amp;amp; Rader, E. (2023). What you see is not what you get: The role of email presentation in phishing susceptibility. Proceedings of the ACM on Human-Computer Interaction, 7(CSCW1), Article 2. https://doi.org/10.1145/3579618&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Detailed Description:&#039;&#039;&#039; Threat actors create QR codes that redirect to malicious sites impersonating legitimate sites&amp;lt;ref&amp;gt;https://blog.knowbe4.com/qr-code-phishing-is-growing-more-sophisticated&amp;lt;/ref&amp;gt;.  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;INTERACTIONS&#039;&#039;&#039; [VETs]: [[Misdirection-Distraction]] (Exploit, CAT-2022-014)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Examples:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Case Example(s):&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Example(s) From The Wild:&#039;&#039;&#039;  &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Comments:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;References:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=470</id>
		<title>CognitiveAttackTaxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=470"/>
		<updated>2024-11-06T06:43:19Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ &#039;&#039;&#039;Cognitive Attack Taxonomy&#039;&#039;&#039;&amp;lt;br&amp;gt;												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-01    	 || 	 [[Quishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory_Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
	<entry>
		<id>https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=469</id>
		<title>CognitiveAttackTaxonomy</title>
		<link rel="alternate" type="text/html" href="https://cognitiveattacktaxonomy.org/index.php?title=CognitiveAttackTaxonomy&amp;diff=469"/>
		<updated>2024-11-06T06:37:38Z</updated>

		<summary type="html">&lt;p&gt;Info: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable sortable&amp;quot;												&lt;br /&gt;
|+ &#039;&#039;&#039;Cognitive Attack Taxonomy&#039;&#039;&#039;&amp;lt;br&amp;gt;												&lt;br /&gt;
|-												&lt;br /&gt;
! CAT ID !! CAT Name !! Layer !! Category&lt;br /&gt;
|-	CAT ID		CAT Name 	Layer	Category					&lt;br /&gt;
|    	CAT-2024-01    	 || 	 [[QRishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-007    	 || 	 [[Need to Correct  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-006    	 || 	 [[Regulatory_Capture  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-005    	 || 	 [[Perjury_Trap  ]]    	 || 	 8, 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-004    	 || 	 [[Stroop_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-003    	 || 	 [[False_Feedback_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-002    	 || 	 [[Sleeper_Agent_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-001    	 || 	 [[Evil_Eve_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-008    	 || 	 [[Positive_Test_Strategy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2024-010    	 || 	 [[Hyperstition ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|    	CAT-2024-009    	 || 	 [[Psychological_Chuting  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-018    	 || 	 [[Repeated_Exposure  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-017    	 || 	 [[Model_Extraction_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-016    	 || 	 [[Model_Theft  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-015    	 || 	 [[Data_Reconstruction  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-014    	 || 	 [[Model_Inversion_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-013    	 || 	 [[Membership_Inference_Attack  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-012    	 || 	 [[Adversarial_Examples  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-011    	 || 	 [[Evasion_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-010    	 || 	 [[Input_Manipulation_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-009    	 || 	 [[Backdoor_Attacks  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-008    	 || 	 [[Trigger_Based_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-007    	 || 	 [[Training_Data_Poisoning_Attack  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-006    	 || 	 [[Campbell’s_Law  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-005    	 || 	 [[Training_Data_Poisoning  ]]    	 || 	 7    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-004    	 || 	 [[Suffix_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-003    	 || 	 [[Sensitive_Information_Disclosure  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-002    	 || 	 [[Prompt_Injection  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2023-001    	 || 	 [[Overreliance_on_Automation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-321    	 || 	 [[Impulsivity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-320    	 || 	 [[Excessive_Agency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-319    	 || 	 [[Emoji_Injection  ]]    	 || 	 7, 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-318    	 || 	 [[Culture_Jamming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-317    	 || 	 [[Chain-Of-Thought_Manipulation  ]]    	 || 	 7    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-316    	 || 	 [[Network_Ambiance_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-315    	 || 	 [[Maskarovka  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-314    	 || 	 [[Reflexive_Control  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-313    	 || 	 [[Zone_Flooding  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-312    	 || 	 [[Incrementalism  ]]    	 || 	 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-311    	 || 	 [[Compliance-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-310    	 || 	 [[Yes-Ladder  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-309    	 || 	 [[Wing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-308    	 || 	 [[Whorfian_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-307    	 || 	 [[Venue_Change  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-306    	 || 	 [[Trance-Words  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-305    	 || 	 [[Tainted_Leak  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-304    	 || 	 [[Social_Engineering_Toolkit  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-303    	 || 	 [[Slander_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-302    	 || 	 [[Sandbagging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-301    	 || 	 [[Reframing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-300    	 || 	 [[Prop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-299    	 || 	 [[Preloading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-298    	 || 	 [[Pendant_Anchoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-297    	 || 	 [[Open-Ended_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-296    	 || 	 [[Negging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-295    	 || 	 [[Multi-Channel_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-294    	 || 	 [[Mirroring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-293    	 || 	 [[Micro_Expression  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-292    	 || 	 [[Maltego  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-291    	 || 	 [[Leading_Question  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-290    	 || 	 [[Journobaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-289    	 || 	 [[Ice_Breaker  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-288    	 || 	 [[Hot_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-287    	 || 	 [[Honey_Channels  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-286    	 || 	 [[Functional_Opener  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-285    	 || 	 [[Forcing  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-284    	 || 	 [[Firehose_of_Falsehood  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-283    	 || 	 [[False_Time_Constraint  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-282    	 || 	 [[False_Flag  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-281    	 || 	 [[Eject_with_Explanation  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-280    	 || 	 [[Double_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-279    	 || 	 [[Deception-in-Depth  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-278    	 || 	 [[Conversational_Threading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-277    	 || 	 [[Cold_Reading  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-276    	 || 	 [[Buscador  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-275    	 || 	 [[Brushing  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-274    	 || 	 [[Baiting-Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-273    	 || 	 [[Anchor-NLP_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-272    	 || 	 [[Active_Indicator_Probe  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-271    	 || 	 [[Accomplished_Introduction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-270    	 || 	 [[Operant_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-269    	 || 	 [[Neoteny  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-268    	 || 	 [[Need  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-267    	 || 	 [[Need_&amp;amp;_Greed_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-266    	 || 	 [[Fear  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-265    	 || 	 [[Jolly_Roger_Bot  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-264    	 || 	 [[eWhoring  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-263    	 || 	 [[Synthetic_Media_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-262    	 || 	 [[Deepfake_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-261    	 || 	 [[Virus_Hoax  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-260    	 || 	 [[Virtual_Kidnapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-259    	 || 	 [[Telemarketing_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-258    	 || 	 [[Tech_Support_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-257    	 || 	 [[Romance_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-256    	 || 	 [[Hoax_Virus  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-255    	 || 	 [[Gift-Card_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-254    	 || 	 [[Crab_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-253    	 || 	 [[Cat_Fishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-252    	 || 	 [[Business_Email_Compromise  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-251    	 || 	 [[Advance_Fee_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-250    	 || 	 [[War_Shipping  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-249    	 || 	 [[Tailgating  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-248    	 || 	 [[Snail_Mail_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-247    	 || 	 [[Shoulder_Surfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-246    	 || 	 [[Dumpster_Diving  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-245    	 || 	 [[Baiting-Drop  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-244    	 || 	 [[Assistance_Ploy  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-243    	 || 	 [[Robot_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-242    	 || 	 [[Dolphin_Attack  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-241    	 || 	 [[Acoustic_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-240    	 || 	 [[Robo_Calling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-239    	 || 	 [[Spamigation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-238    	 || 	 [[Strategic_Lawsuit_Against_Public_Participation  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-237    	 || 	 [[Patent_Trolling  ]]    	 || 	 10    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-236    	 || 	 [[Legal_Loophole  ]]    	 || 	 10    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-235    	 || 	 [[Lawfare  ]]    	 || 	 10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-234    	 || 	 [[Supply_Chain_Attack  ]]    	 || 	 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-233    	 || 	 [[Shadow_Security  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-232    	 || 	 [[Shadow_IT  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-231    	 || 	 [[Shadow_AP  ]]    	 || 	 9    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-230    	 || 	 [[Escalation_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-229    	 || 	 [[Cybersquatting  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-228    	 || 	 [[Spectrum_of_Allies  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-227    	 || 	 [[Unity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-226    	 || 	 [[Social_Proof  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-225    	 || 	 [[Scarcity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-224    	 || 	 [[Reversing_Authority  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-223    	 || 	 [[Reciprocity-Need_for  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-222    	 || 	 [[Pawn-Pivot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-221    	 || 	 [[Party_Crashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-220    	 || 	 [[Liking  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-219    	 || 	 [[Door-in-the-Face_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-218    	 || 	 [[Commitment-Consistency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-217    	 || 	 [[Bandwagon_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-216    	 || 	 [[Authority-Deference_to  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-215    	 || 	 [[Assistance-Need_to_Provide  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-214    	 || 	 [[Network_Affect_Contagion  ]]    	 || 	 7, 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-213    	 || 	 [[Wall_Banging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-212    	 || 	 [[Trolling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-211    	 || 	 [[Trevor&#039;s_Axiom  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-210    	 || 	 [[Sympathy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-209    	 || 	 [[Streisand_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-208    	 || 	 [[Stereotyping  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-207    	 || 	 [[Social_Desirability_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-206    	 || 	 [[Outgroup_Homogeneity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-205    	 || 	 [[Network_Manipulated_Affect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-204    	 || 	 [[Mass_Psychogenic_Illness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-203    	 || 	 [[Ingroup_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-202    	 || 	 [[Zombification  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-201    	 || 	 [[Strobe_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-200    	 || 	 [[Sonic_Area_Denial  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-199    	 || 	 [[P300_Guilty_Knowledge_Test  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-198    	 || 	 [[Interoceptive_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-197    	 || 	 [[Tab-Napping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-196    	 || 	 [[Prevalence_Paradox  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-195    	 || 	 [[Noise_Injection  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-194    	 || 	 [[Human_Buffer_Overflow  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-193    	 || 	 [[Gray_Signal_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-192    	 || 	 [[Focusing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-191    	 || 	 [[Distracted_Approach-Distraction  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-190    	 || 	 [[Boredom  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-189    	 || 	 [[Automaticity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-188    	 || 	 [[Video_Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-187    	 || 	 [[Social_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-186    	 || 	 [[Perceptual_Deception  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-185    	 || 	 [[Like_Jacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-184    	 || 	 [[IDN_Homograph_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-183    	 || 	 [[Clickjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-182    	 || 	 [[Traitor_Tracing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-181    	 || 	 [[Ignorance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-180    	 || 	 [[File_Masquerading  ]]    	 || 	 8, 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-179    	 || 	 [[We_Know_All  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-178    	 || 	 [[Silence  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-177    	 || 	 [[Sensory_Matching  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-176    	 || 	 [[Secret_Knowledge  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-175    	 || 	 [[Rubber-Hose_Cryptanalysis  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-174    	 || 	 [[Repetition  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-173    	 || 	 [[Repeat-a-Word  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-172    	 || 	 [[Rapid_Fire  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-171    	 || 	 [[Quid_Pro_Quo  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-170    	 || 	 [[Provocative_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-169    	 || 	 [[Pride_and_Ego_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-168    	 || 	 [[Oblique_Reference  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-167    	 || 	 [[Neuro-Linguistic_Programming  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-166    	 || 	 [[Naïve_Mentality  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-165    	 || 	 [[Incentive_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-164    	 || 	 [[Hour_Glass_Method  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-163    	 || 	 [[Futility  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-162    	 || 	 [[Flattery  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-161    	 || 	 [[File_and_Dossier  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-160    	 || 	 [[Fear-Up_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-159    	 || 	 [[Fear-Down_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-158    	 || 	 [[Ethical_Dilemma  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-157    	 || 	 [[Establish_Your_Identity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-156    	 || 	 [[Emotional_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-155    	 || 	 [[Elicitation_of_Information  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-154    	 || 	 [[Disbelief  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-153    	 || 	 [[Direct_Approach  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-152    	 || 	 [[Deliberate_False_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-151    	 || 	 [[Criticism  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-150    	 || 	 [[Complaining-Tendency  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-149    	 || 	 [[Change_of_Scene  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-148    	 || 	 [[Whaling  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-147    	 || 	 [[Tailored_Messaging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-146    	 || 	 [[Sniper_Ad_Targeting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-145    	 || 	 [[Pluridentity_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-144    	 || 	 [[Inference_Attack  ]]    	 || 	 7,8,9,10    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-143    	 || 	 [[Data_Vulnerability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-142    	 || 	 [[Vishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-141    	 || 	 [[Spear_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-140    	 || 	 [[Sock-Puppetry  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-139    	 || 	 [[SMSishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-138    	 || 	 [[Shilling_Attack  ]]    	 || 	 9    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-137    	 || 	 [[Shill  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-136    	 || 	 [[Semantic_Attack  ]]    	 || 	 7, 8, 9    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-135    	 || 	 [[Scambaiting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-134    	 || 	 [[Reverse_Social_Engineering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-133    	 || 	 [[Pretext-Pretexting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-132    	 || 	 [[Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-131    	 || 	 [[Impersonation_Scam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-130    	 || 	 [[Honey_Trap  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-129    	 || 	 [[Honey_Token  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-128    	 || 	 [[Honey_Pot  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-127    	 || 	 [[Honey_Phish  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-126    	 || 	 [[Greenwashing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-125    	 || 	 [[Gaslighting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-124    	 || 	 [[Cognitive_Malware_Injection  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-123    	 || 	 [[Clone_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-122    	 || 	 [[Astro-Turfing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-121    	 || 	 [[Transmission_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-120    	 || 	 [[Mis-Addressed_Email  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-119    	 || 	 [[Loss_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-118    	 || 	 [[Leakage_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-117    	 || 	 [[Disposal_Errors  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-116    	 || 	 [[Configuration_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-115    	 || 	 [[Curiosity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-114    	 || 	 [[Zeigarnik_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-113    	 || 	 [[Whorfianism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-112    	 || 	 [[von_Restorff_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-111    	 || 	 [[Unfinished-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-110    	 || 	 [[Suggestion  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-109    	 || 	 [[Subjective_Validation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-108    	 || 	 [[Straw_Man-Argument  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-107    	 || 	 [[Status_Quo_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-106    	 || 	 [[Spotlight_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-105    	 || 	 [[Spacing_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-104    	 || 	 [[Source_Monitoring_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-103    	 || 	 [[Serial_Position_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-102    	 || 	 [[Self-Serving_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-101    	 || 	 [[Self-Relevance_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-100    	 || 	 [[Search_Engine_Manipulation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-099    	 || 	 [[Satisficing  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-098    	 || 	 [[Risk_Homeostasis  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-097    	 || 	 [[Relativism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-096    	 || 	 [[Probability_Blindness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-095    	 || 	 [[Pre-Suasion  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-094    	 || 	 [[Planning_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-093    	 || 	 [[Peak-End_Rule  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-092    	 || 	 [[Overconfidence  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-091    	 || 	 [[Optimism_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-090    	 || 	 [[Omission_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-089    	 || 	 [[Next-In-Line-Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-088    	 || 	 [[Neglect_of_Probability  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-087    	 || 	 [[Negativity_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-086    	 || 	 [[Narrative_Influence  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-085    	 || 	 [[Mystery_Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-084    	 || 	 [[Mother_Teresa_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-083    	 || 	 [[Mood-Congruent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-082    	 || 	 [[Mental_Set  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-081    	 || 	 [[Malware-Induced_Misperception_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-080    	 || 	 [[Self-Relevance-Magnetizer  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-079    	 || 	 [[Loss_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-078    	 || 	 [[Levels-of-Processing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-077    	 || 	 [[Leveling_and_Sharpening  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-076    	 || 	 [[Involuntary_Musical_Imagery  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-075    	 || 	 [[Involuntary_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-074    	 || 	 [[Inoculation_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-073    	 || 	 [[Illusory_Correlation  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-072    	 || 	 [[Illusion_of_Control  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-071    	 || 	 [[IKEA_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-070    	 || 	 [[Hyperbolic_Discounting  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-069    	 || 	 [[Hindsight_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-068    	 || 	 [[Halo_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-067    	 || 	 [[Gambler&#039;s_Fallacy  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-066    	 || 	 [[Fundamental_Attribution_Error  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-065    	 || 	 [[Functional_Fixedness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-064    	 || 	 [[Frequency_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-063    	 || 	 [[Framing_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-062    	 || 	 [[Foot-In-the-Door_Technique  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-061    	 || 	 [[Fear_of_Missing_Out  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-060    	 || 	 [[False_Uniqueness_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-059    	 || 	 [[False_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-058    	 || 	 [[False_Consensus_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-057    	 || 	 [[Endowment_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-056    	 || 	 [[Egocentric_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-055    	 || 	 [[Ear_Worm  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-054    	 || 	 [[Dunning–Kruger_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-053    	 || 	 [[Dread_Aversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-052    	 || 	 [[Default_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-051    	 || 	 [[Decoy_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-050    	 || 	 [[Decision_Fatigue  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-049    	 || 	 [[Context_Dependent_Memory  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-048    	 || 	 [[Confirmation_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-047    	 || 	 [[Cognitive_Malware  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-046    	 || 	 [[Cognitive_Dissonance  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-045    	 || 	 [[Cognitive_Deception  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-044    	 || 	 [[Clustering_Illusion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-043    	 || 	 [[Classical_Conditioning  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-042    	 || 	 [[Ben_Franklin_Effect  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-041    	 || 	 [[Belief_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-040    	 || 	 [[Base_Rate_Neglect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-039    	 || 	 [[Barnum_Statement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-038    	 || 	 [[Availability_Heuristic  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-037    	 || 	 [[Anchoring  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-036    	 || 	 [[Ambiguous_Self_Induced_Disinformation_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-035    	 || 	 [[Ambient_Tactical_Deception_Attacks  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-034    	 || 	 [[Actor-Observer_Bias  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-033    	 || 	 [[Wikijacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-032    	 || 	 [[Wi-Fi_Evil_Twin  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-031    	 || 	 [[Water_Hole_Attack  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-030    	 || 	 [[Typosquatting  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-029    	 || 	 [[Social_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-028    	 || 	 [[Lateral_Phishing  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-027    	 || 	 [[Fluency_Effect  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-026    	 || 	 [[Familiarity  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-025    	 || 	 [[Brandjacking  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-024    	 || 	 [[DELETED DUE TO REDUNDANCY ]]    	 || 	     	 || 	 &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-023    	 || 	 [[Trick_Questions  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-022    	 || 	 [[Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-021    	 || 	 [[Sneak_into_Basket  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-020    	 || 	 [[Scareware  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-019    	 || 	 [[Roach_Motel  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-018    	 || 	 [[Privacy_Zuckering  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-017    	 || 	 [[Price_Comparison_Prevention  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-016    	 || 	 [[Persuasive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-015    	 || 	 [[Mouse-Trapping  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-014    	 || 	 [[Misdirection-Distraction  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-013    	 || 	 [[Malvertisement  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-012    	 || 	 [[Hidden_Costs  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-011    	 || 	 [[Friend_Spam  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-010    	 || 	 [[Forced_Continuity  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-009    	 || 	 [[Disguised_Ads  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-008    	 || 	 [[Dark_Design_Patterns  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-007    	 || 	 [[Confirm_Shaming  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-006    	 || 	 [[Click-Bait  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-005    	 || 	 [[Bait_and_Switch  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-004    	 || 	 [[Addictive_Technology  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-003    	 || 	 [[Nudging  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-002    	 || 	 [[Forcing_Function  ]]    	 || 	 8    	 || 	 TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2022-001    	 || 	 [[Fogg_Model_of_Behavior  ]]    	 || 	 8    	 || 	 Tool / TTP &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-010    	 || 	 [[Excitement-Appeal_to  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-009    	 || 	 [[Low_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-008    	 || 	 [[Low_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-007    	 || 	 [[Low_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-012    	 || 	 [[Reciprocation  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-011    	 || 	 [[Authority  ]]    	 || 	 8    	 || 	 Exploit &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-006    	 || 	 [[Low_Openness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-005    	 || 	 [[High_Neuroticism  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-004    	 || 	 [[High_Agreeableness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-003    	 || 	 [[High_Extraversion  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-002    	 || 	 [[High_Conscientiousness  ]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-   &lt;br /&gt;
|    	CAT-2021-001    	 || 	 [[High_Openness]]    	 || 	 8    	 || 	 Vulnerability &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Info</name></author>
	</entry>
</feed>