Common Information
Type Value
Value
cve-2016-4117
Category
Type Cve
Misp Type
Description
Details Published Attributes CTI Title
Details Pdf 2024-02-07 100 Patterns and Targets for Ransomware Exploitation of Vulnerabilities: 2017–2023
Details Website 2023-06-13 961 Known Exploited Vulnerabilities Catalog | CISA
Details Pdf 2022-02-10 69 2021 Vulnerability Landscape
Details Pdf 2020-07-08 2403 Threat Group Cards: A Threat Actor Encyclopedia
Details Pdf 2020-03-17 34 Criminal Underground Continues to Target Microsoft Products in Top 2019 Exploited Vulnerabilities List
Details Pdf 2020-02-12 36 Criminal Underground Continues to Target Microsoft Products in Top 2019 Exploited Vulnerabilities List
Details Pdf 2019-12-04 195 Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers
Details Pdf 2019-07-23 29 Bestsellers in the Underground Economy: Measuring Malware Popularity by Forum
Details Pdf 2019-06-24 1277 Threat Group Cards: A Threat Actor Encyclopedia
Details Website 2019-04-17 186 Virus Bulletin :: VB2019 paper: Attribution is in the object: using RTF object dimensions to track APT phishing weaponizers
Details Website 2019-02-15 2 Metasploit Wrap-Up | Rapid7 Blog
Details Website 2018-07-10 9 APT Trends Report Q2 2018
Details Pdf 2018-03-26 11 ‘Soft Target: The Top 10 Vulnerabilities Used by Cybercriminals
Details Pdf 2018-02-26 61 中国高级持续性威胁(APT) 研究报告
Details Pdf 2017-12-06 4 REVIEW OF THE YEAR 2017
Details Website 2017-11-21 19 Office 365 Advanced Threat Protection defense for corporate networks against recent Office exploit attacks - Microsoft Security Blog
Details Website 2017-10-16 1 Middle Eastern hacking group is using FinFisher malware to conduct international espionage
Details Website 2017-10-16 23 BlackOasis APT and new targeted attacks leveraging zero-day exploit
Details Pdf 2017-09-11 72 Walking in your enemy's shadow: when fourth-party collection becomes attribution hell (Virus Bulletin conference paper)
Details Website 2017-08-31 39 Dissecting Sundown Exploit Kit
Details Pdf 2017-08-25 19 Guerrero-Saade-Raiu-VB2017.indd
Details Website 2017-07-13 4 Phishing Against Protected View
Details Website 2017-06-20 65 AdGholas Malvertising Campaign Using Astrum EK to Deliver Mole Ransomware | Proofpoint US
Details Website 2017-06-13 13 HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure | CISA
Details Website 2017-06-01 39 Microsoft Word Intruder Integrates CVE-2017-0199, Utilized by Cobalt Group to Target Financial Institutions | Proofpoint US