Common Information
Type | Value |
---|---|
Value |
cve-2016-4117 |
Category | |
Type | Cve |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | 2024-02-07 | 100 | Patterns and Targets for Ransomware Exploitation of Vulnerabilities: 2017–2023 | |||
Details | Website | 2023-06-13 | 961 | Known Exploited Vulnerabilities Catalog | CISA | ||
Details | 2022-02-10 | 69 | 2021 Vulnerability Landscape | |||
Details | 2020-07-08 | 2403 | Threat Group Cards: A Threat Actor Encyclopedia | |||
Details | 2020-03-17 | 34 | Criminal Underground Continues to Target Microsoft Products in Top 2019 Exploited Vulnerabilities List | |||
Details | 2020-02-12 | 36 | Criminal Underground Continues to Target Microsoft Products in Top 2019 Exploited Vulnerabilities List | |||
Details | 2019-12-04 | 195 | Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers | |||
Details | 2019-07-23 | 29 | Bestsellers in the Underground Economy: Measuring Malware Popularity by Forum | |||
Details | 2019-06-24 | 1277 | Threat Group Cards: A Threat Actor Encyclopedia | |||
Details | Website | 2019-04-17 | 186 | Virus Bulletin :: VB2019 paper: Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers | ||
Details | Website | 2019-02-15 | 2 | Metasploit Wrap-Up | Rapid7 Blog | ||
Details | Website | 2018-07-10 | 9 | APT Trends Report Q2 2018 | ||
Details | 2018-03-26 | 11 | ‘Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals | |||
Details | 2018-02-26 | 61 | 中国高级持续性威胁(APT) 研究报告 | |||
Details | 2017-12-06 | 4 | REVIEW OF THE YEAR 2017 | |||
Details | Website | 2017-11-21 | 19 | Office 365 Advanced Threat Protection defense for corporate networks against recent Office exploit attacks - Microsoft Security Blog | ||
Details | Website | 2017-10-16 | 1 | Middle Eastern hacking group is using FinFisher malware to conduct international espionage | ||
Details | Website | 2017-10-16 | 23 | BlackOasis APT and new targeted attacks leveraging zero-day exploit | ||
Details | 2017-09-11 | 72 | Walking in your enemy's shadow: when fourth-party collection becomes attribution hell (Virus Bulletin conference paper) | |||
Details | Website | 2017-08-31 | 39 | Dissecting Sundown Exploit Kit | ||
Details | 2017-08-25 | 19 | Guerrero-Saade-Raiu-VB2017.indd | |||
Details | Website | 2017-07-13 | 4 | Phishing Against Protected View | ||
Details | Website | 2017-06-20 | 65 | AdGholas Malvertising Campaign Using Astrum EK to Deliver Mole Ransomware | Proofpoint US | ||
Details | Website | 2017-06-13 | 13 | HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure | CISA | ||
Details | Website | 2017-06-01 | 39 | Microsoft Word Intruder Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions | Proofpoint US |