ATTACK

Brand Owner (click to sort) Address Description
AATAC A & A TRUCK AND AUTO CENTER, INC. 4000 SAM WILSON ROAD CHARLOTTE NC 28214 ATTACK;Load Beds for Land Vehicles;
ATAC BENCHMARK COMMERCIAL, INC. 466 Lawndale Drive, Suite D Salt Lake City UT 84115 ATTACK;skin and body cream;
ATAC AMERICAN TECHNOLOGY ACQUISITION CORPORATION 101 East Park Boulevard, Suite 467 Plano TX 75074 ATTACK;business management, business planning, and business acquisition and merger consulting services;
ATAC ATAC Corporation 2770 De La Cruz Blvd Santa Clara CA 950592624 ATTACK;Computer services, namely hardware and software integration; and computer software development featuring computer models, simulations, decision aids and analysis tools to support design, planning, evaluation, and analysis requirements in the areas of airport and airspace facilities and operations, airport terminal layout, passenger and baggage security systems, military aviation training systems and operations, air traffic control procedures, aviation safety and risk impacts, system capacity impacts, aircraft noise impacts, air traffic system operational performance, and advanced concepts, procedures, and technologies;
ATAC STOEGER INDUSTRIES, INC. 17603 Indian Head Highway Accokeek MD 20607 ATTACK;Guns, namely, air guns;
ATAK E.S. ORIGINALS, INC. 7th Floor 440 9th Avenue New York NY 10001 ATTACK;FOOTWEAR;
ATT&CK THE MITRE CORPORATION 7515 Colshire Drive McLean VA 221027508 ATTACK; ATT AND CK;Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation;
ATTAC Boots Hercules Agrochemicals Co. Wilmington DE ATTACK;
ATTACK DETECTIVE SOC Prime, Inc. 399 Boylston Street, 6th Floor Boston MA 02116 ATTACK;Computer security threat analysis for protecting data; Software as a service (SAAS) services featuring software for collecting, aggregating, and arranging data from multiple security assets to provide real-time attack surface visibility and offering a list of curated Sigma rules aimed at addressing identified security gaps and improving the effectiveness of the Security Control Center (SOC);
ATTAK ABN GROUP, INC. P.O. BOX 111 RIDGEWOOD NJ 07450 ATTACK;clothing, outerwear, footwear, and headgear for men, women, and children, namely, jackets, coats, pants, jeans, shorts, shirts, T-shirts, sweaters, sweatshirts, leather jackets, boots, shoes, sandals, athletic footwear, hats, caps, socks, and belts;
ATTAK YAMAHA HATSUDOKI KABUSHIKI KAISHA 2500 Shingai, Iwata-shi Shizuoka-ken 438-8501 Japan ATTACK;Snowmobiles and structural parts therefor;
ATTAQUE DANIEL M. LONERGAN AND DOMINIQUE STRAUSS 313 ABERCROMBIE ST. CHIPPENDALE NEW SOUTH WALES Australia ATTACK;CLOTHING, NAMELY BELTS;THE WORD ATTAQUE IS A FRENCH WORD MEANING ATTACK.;
MAC ATTACK McDonald's Corporation 110 N. CARPENTER STREET CHICAGO IL 60607 attack;clothing - namely shirts, jackets and pants;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Methods and systems of screening input strings that are intended for use by a Web server are described. In the described embodiment, an attack pattern is determined that can be used to attack a Web server. A search pattern is defined that can be used to detect the attack pattern. The search pattern is defined in a flexible, extensible manner that permits variability among its constituent parts. An input string that is intended for use by a Web server is received and evaluated using the search pattern to ascertain whether the attack pattern is present. If an attack pattern is found that matches the search pattern, then a remedial action is implemented.