Common Information
Type | Value |
---|---|
Value |
T1195 |
Category | |
Type | Mitre Att&Ck Techniques |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-31 | 9 | Satori Threat Intelligence Alert: Phish ānā Ships Fakes Online Shops to Steal Money and Credit Card Information | ||
Details | 2024-09-17 | 770 | ENISA THREAT LANDSCAPE 2024 | |||
Details | Website | 2024-08-26 | 30 | Threat Intelligence Report 20th August ā 26th August 2024 | ||
Details | 2024-05-13 | 22 | ESET APT Activity Report Q2 2023-Q3 2023: Government espionage and unpatched vulnerabilities | |||
Details | 2024-04-17 | 161 | Managed Detection and Response | |||
Details | 2024-04-03 | 22 | Microsoft Word - Active Adversary Report 2024-01.docx | |||
Details | 2023-11-24 | 50 | Threat Advisory | |||
Details | 2023-10-18 | 1172 | ENISA THREAT LANDSCAPE 2023 | |||
Details | 2023-06-26 | 11 | Threat Advisory | |||
Details | Website | 2023-06-09 | 207 | Over 45 thousand Users Fell Victim to Malicious PyPI Packages | ||
Details | Website | 2023-05-30 | 112 | Russia/Ukraine Update - May 2023 | ||
Details | 2023-05-16 | 48 | PowerPoint Presentation | |||
Details | Website | 2023-05-09 | 12 | 3CX Supply Chain Campaign Technical analysis and POC | ||
Details | 2023-04-27 | 44 | PowerPoint Presentation | |||
Details | Website | 2023-04-25 | 54 | Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server | ||
Details | Website | 2023-04-20 | 72 | 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant | ||
Details | 2023-04-18 | 99 | LockBit 3.0 | |||
Details | Website | 2023-04-01 | 28 | 3CX Desktop App targeted in supply chain attack | ||
Details | Website | 2023-02-27 | 49 | Kaseya ransomware attack: a cyber kill chain analysis | ||
Details | 2023-01-30 | 91 | APT ACTIVITY REPORT | |||
Details | 2023-01-23 | 20 | PowerPoint Presentation | |||
Details | 2023-01-20 | 454 | CYBERDEFENSE REPORT Software Supply Chain Attacks An Illustrated Typological Review | |||
Details | Website | 2023-01-13 | 29 | 6 Tips for a More Secure Supply Chain | ||
Details | 2022-10-28 | 50 | Supply Chain as Kill Chain: Security in the Era of Zero Trust | |||
Details | 2022-10-18 | 728 | OPERA1ER |