Common Information
Type | Value |
---|---|
Value |
netscan.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-24 | 12 | Understanding the Initial Stages of Web Shell and VPN Threats An MXDR Analysis | ||
Details | Website | 2024-10-03 | 57 | Threat actor believed to be spreading new MedusaLocker variant since 2022 | ||
Details | Website | 2024-10-02 | 35 | Threat Brief: Understanding Akira Ransomware | Qualys Security Blog | ||
Details | Website | 2024-09-10 | 10 | Inc Ransom Attack Analysis: Extortion Methodologies - ReliaQuest | ||
Details | Website | 2024-09-10 | 10 | Inc Ransom Attack Analysis: Extortion Methodologies - ReliaQuest | ||
Details | Website | 2024-08-06 | 9 | Inc Ransom Attack Analysis - ReliaQuest | ||
Details | 2024-06-10 | 49 | Threat Advisory | |||
Details | Website | 2024-06-04 | 56 | Lost in the Fog: A New Ransomware Threat - Arctic Wolf | ||
Details | Website | 2024-05-10 | 256 | #StopRansomware: Black Basta | CISA | ||
Details | Website | 2024-01-29 | 115 | Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours | ||
Details | Website | 2023-11-28 | 81 | Aki-RATs - Command and Control Party | ||
Details | 2023-11-23 | 147 | Threat Advisory | |||
Details | Website | 2023-11-02 | 12 | Hackers use Citrix Bleed flaw in attacks on govt networks worldwide - RedPacket Security | ||
Details | Website | 2023-11-01 | 12 | Hackers use Citrix Bleed flaw in attacks on govt networks worldwide | ||
Details | Website | 2023-10-17 | 4 | A Modern Approach to Adaptive Threat Hunting Methodologies | ||
Details | Website | 2023-09-15 | 4 | Weaponising VMs to bypass EDR - Akira ransomware | ||
Details | 2023-09-12 | 142 | UN GROUPE CYBERCRIMINEL AUX MULTIPLES RANÇONGICIELS | |||
Details | Website | 2023-08-28 | 135 | HTML Smuggling Leads to Domain Wide Ransomware - The DFIR Report | ||
Details | Website | 2023-05-16 | 77 | #StopRansomware: BianLian Ransomware Group | CISA | ||
Details | 2023-04-26 | 207 | A Comprehensive Guide to Detect Ransomware | |||
Details | Website | 2023-04-18 | 27 | An Avertium Case Study - LockBit | ||
Details | 2023-04-17 | 205 | A Comprehensive Guide to Detect Ransomware | |||
Details | Website | 2023-03-16 | 78 | Bee-Ware of Trigona, An Emerging Ransomware Strain | ||
Details | Website | 2023-01-12 | 1 | IcedID Malware Strikes Again: Active Directory Domain Compromised in Under 24 Hours | ||
Details | Website | 2023-01-12 | 2 | El malware IcedID ataca de nuevo: Dominio de Active Directory comprometido en menos de 24 horas |