Common Information
Type | Value |
---|---|
Value |
T1530 |
Category | |
Type | Mitre Att&Ck Techniques |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 90 | From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 24 | Major cyber attacks and data breaches of 2024 | ||
Details | Website | 2024-10-28 | 51 | CloudScout: Evasive Panda scouting cloud services | ||
Details | 2024-09-17 | 770 | ENISA THREAT LANDSCAPE 2024 | |||
Details | Website | 2024-09-10 | 6 | Dark Web Profile: GlorySec - SOCRadar® Cyber Intelligence Inc. | ||
Details | 2024-06-11 | 311 | Threat Advisory | |||
Details | Website | 2024-06-07 | 76 | A guide to threat hunting and monitoring in Snowflake | Datadog Security Labs | ||
Details | 2024-01-12 | 14 | Threat Advisory | |||
Details | 2023-12-15 | 178 | Threat Advisory | |||
Details | 2023-11-24 | 50 | Threat Advisory | |||
Details | 2023-10-18 | 1172 | ENISA THREAT LANDSCAPE 2023 | |||
Details | Website | 2023-09-15 | 816 | UNC3944: SMS Phishing, SIM Swapping, and Ransomware Attacks | ||
Details | Website | 2023-06-30 | 3 | Building an Azure Cloud Detection Tool — Part 3 | ||
Details | Website | 2023-01-28 | 13 | ShinyHunters: Here's how to stop the new hacking group | Intel471 | ||
Details | 2023-01-25 | 41 | PowerPoint Presentation | |||
Details | 2022-10-18 | 728 | OPERA1ER | |||
Details | 2022-08-23 | 40 | Detection in the Sky: Sigma Rules to Enhance Cloud Security for the Big Three | |||
Details | 2022-05-21 | 344 | UNKNOWN | |||
Details | Website | 2022-05-04 | 22 | Old Services, New Tricks: Cloud Metadata Abuse by UNC2903 | Mandiant |