Common Information
Type | Value |
---|---|
Value |
e.doc |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-26 | 2 | The Most Significant Cyberattacks in History: Techniques, Tactics, and Tools | ||
Details | Website | 2024-10-07 | 11 | Managing OT and IT Risk: What Cybersecurity Leaders Need to Know | ||
Details | Website | 2024-09-30 | 1 | Supply Chain Attacks: The Next Frontier in Cybersecurity Threats | ||
Details | 2023-12-21 | 23 | Threat_Horizons_Aug2023 | |||
Details | Website | 2023-07-08 | 2 | Malware Exposed: Understanding the Menace of Malware and Real-World Cases | ||
Details | Website | 2023-06-16 | 4 | The MOVEit Transfer Mayhem: Why Do We Fail in Vulnerability Management? | ||
Details | 2023-05-02 | 329 | IT-Bedrohunglage in Bezug auf industrielle Steuerungssysteme und kritische Infrasrukturen | |||
Details | Website | 2023-03-26 | 1 | NotPetya — the most expensive cyberattack | ||
Details | 2023-01-20 | 454 | CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review | |||
Details | 2023-01-11 | 4 | Threat Landscape for Industrial Automation Systems in H1 2017 | |||
Details | 2023-01-11 | 25 | Threat landscape for industrial automation systems | |||
Details | Website | 2022-12-15 | 4 | Ten Alleged Nation-State Cyber-Attacks | ||
Details | 2022-04-29 | 61 | Presentation title slide - 42 pt Times New Roman, White | |||
Details | Website | 2022-03-21 | 5 | Sandworm: A tale of disruption told anew | WeLiveSecurity | ||
Details | Website | 2022-01-21 | 20 | Ukraine Campaign Delivers Defacement and Wipers, in Continued Escalation | ||
Details | 2021-09-24 | 282 | IT-Bedrohungslage in Bezug auf industrielle Steuerungssysteme und kritische Infrastrukturen | |||
Details | 2021-04-27 | 5 | ESET INDUSTRY REPORT ON GOVERNMENT | |||
Details | 2021-02-22 | 5 | Iron Rain: Understanding Nation-State Motives and APT Groups | |||
Details | 2021-02-17 | 8 | Supply Chain Attacks: Cyber Criminals Target the Weakest Link (White Paper) | |||
Details | Website | 2020-11-17 | 10 | Ukraine's Top Cyber Cop on Defending Against Disinformation and Russian Hackers | ||
Details | Website | 2020-11-16 | 98 | Lazarus supply‑chain attack in South Korea | WeLiveSecurity | ||
Details | 2020-10-19 | 34 | Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace: Unsealed Indictment | |||
Details | Website | 2020-08-29 | 35 | Emulating NotPetya bootloader with Miasm | | ||
Details | Website | 2019-04-22 | 7 | C/C++ Runtime Library Code Tampering in Supply Chain | ||
Details | Website | 2019-02-22 | 37 | AutoCAD - Designing a Kill Chain |