Common Information
Type | Value |
---|---|
Value |
T1565 |
Category | |
Type | Mitre Att&Ck Techniques |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 90 | From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-17 | 30 | Securing Continuous Delivery: Argo CD Threat Detection | ||
Details | 2024-09-17 | 770 | ENISA THREAT LANDSCAPE 2024 | |||
Details | Website | 2024-09-06 | 46 | Самые интересные киберинциденты в 2023 году: внутренние угрозы и многое другое | ||
Details | Website | 2024-09-03 | 46 | Most interesting IR cases in 2023: insider threats and more | ||
Details | 2024-04-17 | 161 | Managed Detection and Response | |||
Details | 2023-12-29 | 35 | PowerPoint Presentation | |||
Details | 2023-10-18 | 1172 | ENISA THREAT LANDSCAPE 2023 | |||
Details | Website | 2023-05-23 | 23 | Day 2 Falco Container Security - Tuning the Rules – Sysdig | ||
Details | 2023-05-08 | 13 | PowerPoint Presentation | |||
Details | Website | 2023-05-03 | 15 | WinRAR as Cyberweapon: UAC-0165 Targets Ukrainian Public Sector with RoarBat - SOC Prime | ||
Details | 2023-04-27 | 44 | PowerPoint Presentation | |||
Details | Website | 2023-04-25 | 54 | Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server | ||
Details | Website | 2023-04-20 | 72 | 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant | ||
Details | Website | 2023-04-20 | 481 | ATT&CK Changes | ||
Details | 2023-04-13 | 74 | Play Ransomware | |||
Details | Website | 2023-04-03 | 22 | Anomali Cyber Watch: Balada Injector Exploits WordPress Elementor Pro, Icon 3CX Stealer Detected by YARA, Koi Loader-Stealer Compresses-then-Encrypts Memory Streams | ||
Details | Website | 2023-02-24 | 29 | Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part III: Oracle WebLogic | ||
Details | Website | 2023-02-07 | 4 | Ransomware attacks targeting VMware ESXi servers | Wiz Blog | ||
Details | 2023-02-01 | 82 | ANOTHER UAC-0010 STORY | |||
Details | 2022-12-05 | 18 | PowerPoint Presentation | |||
Details | 2022-10-18 | 728 | OPERA1ER | |||
Details | 2022-10-10 | 9 | PowerPoint Presentation | |||
Details | 2022-09-13 | 23 | PowerPoint Presentation | |||
Details | Website | 2022-08-30 | 34 | Anomali Cyber Watch: First Real-Life Video-Spoofing Attack, MagicWeb Backdoors via Non-Standard Key Identifier, LockBit Ransomware Blames Victim for DDoSing Back, and More |