Common Information
Type | Value |
---|---|
Value |
wiz.io |
Category | |
Type | Domain |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-07-30 | 2 | Wiz's Approach to Physical Security & Enterprise Resilience | Wiz Blog | ||
Details | Website | 2024-07-25 | 18 | SeleniumGreed Cryptomining Campaign Exploiting Grid Services | Wiz Blog | ||
Details | Website | 2024-07-17 | 2 | SAPwned: SAP AI vulnerabilities expose customers’ cloud environments and private AI artifacts | Wiz Blog | ||
Details | Website | 2024-06-07 | 22 | DERO cryptojacking adopts new techniques to evade detection | Wiz Blog | ||
Details | Website | 2024-04-04 | 6 | Hugging Face works with Wiz to strengthen AI cloud security | Wiz Blog | ||
Details | Website | 2024-02-08 | 13 | Midnight Blizzard breach: analysis and best practices | Wiz Blog | ||
Details | Website | 2024-02-06 | 9 | Critical Vulnerabilities in Ivanti Exploited In-The-Wild | Wiz Blog | ||
Details | Website | 2024-01-24 | 5 | Cloud Threat Landscape: a new resource for cloud defenders | Wiz Blog | ||
Details | Website | 2023-12-12 | 9 | Top 10 Cyber Threats of 2023 | ||
Details | Website | 2023-11-01 | 2 | Announcing the EKS Cluster Games | Wiz Blog | ||
Details | Website | 2023-10-27 | 1 | After the Deal Closes: Lessons Learned in M&A Cybersecurity | ||
Details | Website | 2023-09-18 | 2 | 38TB of data accidentally exposed by Microsoft AI researchers | Wiz Blog | ||
Details | Website | 2023-09-06 | 64 | Summer '23 Cryptomining Attacks: Analysis + Recommendations | Wiz Blog | ||
Details | Website | 2023-07-11 | 8 | PyLoose: Python-based fileless malware targets cloud workloads to deliver cryptominer | Wiz Blog | ||
Details | Website | 2023-06-06 | 3 | The Big IAM Challenge: Test Your Cloud Security Skills | Wiz Blog | ||
Details | Website | 2023-05-09 | 9 | Does your company need a cloud security posture management tool? | ||
Details | Website | 2023-04-19 | 10 | #BrokenSesame: Accidental ‘write’ permissions to private registry allowed potential RCE to Alibaba Cloud Database Services | Wiz Blog | ||
Details | Website | 2023-04-19 | 10 | #BrokenSesame: Accidental ‘write’ permissions to private registry allowed potential RCE to Alibaba Cloud Database Services | Wiz Blog | ||
Details | Website | 2023-03-29 | 3 | BingBang: How a simple developer mistake could have led to Bing.com takeover | Wiz Blog | ||
Details | Website | 2023-03-29 | 8 | BingBang: AAD misconfiguration led to Bing.com results manipulation and account takeover | Wiz Blog | ||
Details | Website | 2023-03-29 | 8 | BingBang: AAD misconfiguration led to Bing.com results manipulation and account takeover | Wiz Blog | ||
Details | Website | 2023-03-02 | 186 | Redirection Roulette: Thousands of hijacked websites in East Asia redirecting visitors to other sites | Wiz Blog | ||
Details | Website | 2022-12-20 | 1 | Wiz introduces Dangling Domain Detection to help you prevent subdomain takeovers | Wiz Blog | ||
Details | Website | 2022-12-01 | 3 | Hell’s Keychain: Supply-chain vulnerability in IBM Cloud Databases for PostgreSQL allows potential unauthorized database access | Wiz Blog | ||
Details | Website | 2022-11-01 | 3 | OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed |