Common Information
Type | Value |
---|---|
Value |
net.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-11 | 19 | [Blue Team Labs Online Write-up] Ozarks | ||
Details | Website | 2024-11-11 | 3 | Veeam Backup & Replication 漏洞在新的 Frag 勒索软件攻击中被重复使用-安全客 - 安全资讯平台 | ||
Details | Website | 2024-11-09 | 3 | Veeam Backup & Replication exploit reused in new Frag ransomware attack | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-09 | 3 | Veeam Backup & Replication exploit reused in new Frag ransomware attack | ||
Details | Website | 2024-11-07 | 21 | Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware | ||
Details | Website | 2024-11-07 | 48 | CrowdStrike Discovers New DoppelPaymer Ransomware & Dridex Variant | ||
Details | Website | 2024-11-04 | 6 | [CyberDefenders Write-up] Reveal | ||
Details | Website | 2024-11-01 | 8 | Nightmare on Hunt Street Writeup | Huntress Labs CTF 2024 | ||
Details | Website | 2024-10-30 | 3 | UnderGround 랜섬웨어, 텔레그램에 탈취 정보 공개 | ||
Details | Website | 2024-10-30 | 72 | LockBit Threat Group Profiling | ||
Details | Website | 2024-10-24 | 12 | Understanding the Initial Stages of Web Shell and VPN Threats An MXDR Analysis | ||
Details | Website | 2024-10-21 | 52 | Akira ransomware continues to evolve | ||
Details | Website | 2024-10-21 | 52 | Akira ransomware continues to evolve | ||
Details | Website | 2024-10-19 | 3 | U.S. CISA adds Veeam Backup and Replication flaw to its Known Exploited Vulnerabilities catalog | ||
Details | Website | 2024-10-17 | 5 | Detecting Malicious Use of LOLBins, Pt. II | Huntress | ||
Details | Website | 2024-10-16 | 4 | 5 Techniques for Collecting Cyber Threat Intelligence | ||
Details | Website | 2024-10-16 | 4 | 5 Techniques for Collecting Cyber Threat Intelligence - RedPacket Security | ||
Details | Website | 2024-10-16 | 24 | Critical Vulnerability In Veeam Products Exploited By Ransomware Gangs - Cyble | ||
Details | Website | 2024-10-15 | 4 | Veeam Vulnerability Actively Exploited By Ransomware Gangs | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-15 | 4 | 利用 Veeam 的关键漏洞传播 Akira 和 Fog 勒索软件-安全客 - 安全资讯平台 | ||
Details | Website | 2024-10-14 | 4 | Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware - RedPacket Security | ||
Details | Website | 2024-10-14 | 4 | Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware | ||
Details | Website | 2024-10-12 | 3 | Ransomware operators exploited Veeam Backup & Replication flaw CVE-2024-40711 in recent attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-12 | 3 | Ransomware operators exploited Veeam Backup & Replication flaw CVE-2024-40711 in recent attacks | ||
Details | Website | 2024-10-11 | 5 | Hackers Exploiting Veeam RCE Vulnerability to Deploy Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting |