Common Information
Type Value
Value
e.doc
Category
Type File
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2024-10-26 2 The Most Significant Cyberattacks in History: Techniques, Tactics, and Tools
Details Website 2024-10-07 11 Managing OT and IT Risk: What Cybersecurity Leaders Need to Know
Details Website 2024-09-30 1 Supply Chain Attacks: The Next Frontier in Cybersecurity Threats
Details Pdf 2023-12-21 23 Threat_Horizons_Aug2023
Details Website 2023-07-08 2 Malware Exposed: Understanding the Menace of Malware and Real-World Cases
Details Website 2023-06-16 4 The MOVEit Transfer Mayhem: Why Do We Fail in Vulnerability Management?
Details Pdf 2023-05-02 329 IT-Bedrohunglage in Bezug auf industrielle Steuerungssysteme und kritische Infrasrukturen
Details Website 2023-03-26 1 NotPetya — the most expensive cyberattack
Details Pdf 2023-01-20 454 CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review
Details Pdf 2023-01-11 4 Threat Landscape for Industrial Automation Systems in H1 2017
Details Pdf 2023-01-11 25 Threat landscape for industrial automation systems
Details Website 2022-12-15 4 Ten Alleged Nation-State Cyber-Attacks
Details Pdf 2022-04-29 61 Presentation title slide - 42 pt Times New Roman, White
Details Website 2022-03-21 5 Sandworm: A tale of disruption told anew | WeLiveSecurity
Details Website 2022-01-21 20 Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation
Details Pdf 2021-09-24 282 IT-Bedrohungslage in Bezug auf industrielle Steuerungssysteme und kritische Infrastrukturen
Details Pdf 2021-04-27 5 ESET INDUSTRY REPORT ON GOVERNMENT
Details Pdf 2021-02-22 5 Iron Rain: Understanding Nation-State Motives and APT Groups
Details Pdf 2021-02-17 8 Supply Chain Attacks: Cyber Criminals Target the Weakest Link (White Paper)
Details Website 2020-11-17 10 Ukraine's Top Cyber Cop on Defending Against Disinformation and Russian Hackers
Details Website 2020-11-16 98 Lazarus supply‑chain attack in South Korea | WeLiveSecurity
Details Pdf 2020-10-19 34 Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace: Unsealed Indictment
Details Website 2020-08-29 35 Emulating NotPetya bootloader with Miasm |
Details Website 2019-04-22 7 C/C++ Runtime Library Code Tampering in Supply Chain
Details Website 2019-02-22 37 AutoCAD - Designing a Kill Chain