technique
https://auth0.com/blog/why-should-use-accesstokens-to-secure-an-api/
Auth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019.
technique
https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens
Cai, S., Flores, J., de Guzman, C., et. al.. (2019, August 27). Microsoft identity platform access tokens. Retrieved October 4, 2019.
technique
https://staaldraad.github.io/2017/08/02/o356-phishing-with-oauth/
Stalmans, E.. (2017, August 2). Phishing with OAuth and o365/Azure. Retrieved October 4, 2019.
technique
https://attack.mitre.org/techniques/T1527
technique
https://developer.okta.com/blog/2018/06/20/what-happens-if-your-jwt-is-stolen
okta. (n.d.). What Happens If Your JWT Is Stolen?. Retrieved September 12, 2019.
technique
https://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf
ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.
technique
https://en.wikipedia.org/wiki/Screensaver
Wikipedia. (2017, November 22). Screensaver. Retrieved December 5, 2017.
technique
https://attack.mitre.org/techniques/T1180
technique
https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/41699
Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.
technique
https://tools.cisco.com/security/center/resources/integrity_assurance.html#26
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Boot Information. Retrieved October 21, 2020.