Common Information
Type | Value |
---|---|
Value |
gist.github.com |
Category | |
Type | Domain |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-02-16 | 37 | No Surprise! ESXiArgs Ransomware Attacks Exploit 2-Year-Old Vulnerability | Deep Instinct | ||
Details | Website | 2023-01-31 | 19 | Evolution of a Software Supply Chain Attacker | ||
Details | Website | 2023-01-15 | 34 | GitHub - opsdisk/pagodo: pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching | ||
Details | Website | 2023-01-02 | 13 | India’s Aadhar card source code disclosure via exposed .svn/wc.db | ||
Details | Website | 2022-12-28 | 13 | “MasquerAds” — Google’s Ad-Words Massively Abused by Threat Actors, Targeting Organizations, GPUs… | ||
Details | Website | 2022-12-28 | 52 | CVE-2022-27510, CVE-2022-27518 – Measuring Citrix ADC & Gateway version adoption on the Internet | ||
Details | Website | 2022-12-01 | 87 | From Macros to No Macros: Continuous Malware Improvements by QakBot | ||
Details | Website | 2022-11-23 | 181 | concerns about Trustcor | ||
Details | Website | 2022-10-07 | 114 | LofyGang - Software Supply Chain Attackers; Organized, Persistent, and Operating for over a Year | ||
Details | Website | 2022-07-23 | 31 | Internet Storm Center Diary 2022-07-23 - SANS Internet Storm Center | ||
Details | Website | 2022-07-14 | 237 | GitHub - MichaelKoczwara/Awesome-CobaltStrike-Defence: Defences against Cobalt Strike | ||
Details | Website | 2022-06-24 | 69 | APT34 - Saitama Agent | ||
Details | Website | 2022-06-07 | 55 | A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak | ||
Details | 2022-05-09 | 114 | THE NEXT-GEN PLUGX/SHADOWPAD? A DIVE INTO THE EMERGING CHINA-NEXUS MODULAR TROJAN, PANGOLIN8RAT | |||
Details | Website | 2022-04-14 | 2 | Persisting XSS With IFrame Traps - TrustedSec | ||
Details | Website | 2022-03-23 | 27 | Zero Dollar Detection and Response Orchestration with n8n, Security Onion, TheHive, and… | ||
Details | 2022-02-23 | 254 | SANCTIONS BE DAMNED | FROM DRIDEX TO MACAW, THE EVOLUTION OF EVIL CORP | |||
Details | 2021-12-29 | 252 | PowerPoint Presentation | |||
Details | Website | 2021-12-23 | 46 | Logs of Log4shell (CVE-2021-44228): log4j is ubiquitous [EN] | ||
Details | Website | 2021-12-12 | 36 | Lacework Labs Identifies Log4J Attacks | ||
Details | Website | 2021-12-12 | 32 | The hidden side of Seclogon part 2: Abusing leaked handles to dump LSASS memory | ||
Details | Website | 2021-12-06 | 10 | How File Hashes Fail As A Malware Detection Heuristic | ||
Details | 2021-11-15 | 358 | 12271_Blackberry_ContellatingBooklet_FULL_ModifiedLinks.indd | |||
Details | Website | 2021-10-18 | 47 | Resource Based Constrained Delegation | ||
Details | Website | 2021-10-12 | 15 | The 2021 Contributor Contest :: Velociraptor - Digging deeper! |