Common Information
Type Value
Value
gist.github.com
Category
Type Domain
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2023-02-16 37 No Surprise! ESXiArgs Ransomware Attacks Exploit 2-Year-Old Vulnerability | Deep Instinct
Details Website 2023-01-31 19 Evolution of a Software Supply Chain Attacker
Details Website 2023-01-15 34 GitHub - opsdisk/pagodo: pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
Details Website 2023-01-02 13 India’s Aadhar card source code disclosure via exposed .svn/wc.db
Details Website 2022-12-28 13 “MasquerAds” — Google’s Ad-Words Massively Abused by Threat Actors, Targeting Organizations, GPUs…
Details Website 2022-12-28 52 CVE-2022-27510, CVE-2022-27518 – Measuring Citrix ADC & Gateway version adoption on the Internet
Details Website 2022-12-01 87 From Macros to No Macros: Continuous Malware Improvements by QakBot
Details Website 2022-11-23 181 concerns about Trustcor
Details Website 2022-10-07 114 LofyGang - Software Supply Chain Attackers; Organized, Persistent, and Operating for over a Year
Details Website 2022-07-23 31 Internet Storm Center Diary 2022-07-23 - SANS Internet Storm Center
Details Website 2022-07-14 237 GitHub - MichaelKoczwara/Awesome-CobaltStrike-Defence: Defences against Cobalt Strike
Details Website 2022-06-24 69 APT34 - Saitama Agent
Details Website 2022-06-07 55 A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak
Details Pdf 2022-05-09 114 THE NEXT-GEN PLUGX/SHADOWPAD? A DIVE INTO THE EMERGING CHINA-NEXUS MODULAR TROJAN, PANGOLIN8RAT
Details Website 2022-04-14 2 Persisting XSS With IFrame Traps - TrustedSec
Details Website 2022-03-23 27 Zero Dollar Detection and Response Orchestration with n8n, Security Onion, TheHive, and…
Details Pdf 2022-02-23 254 SANCTIONS BE DAMNED | FROM DRIDEX TO MACAW, THE EVOLUTION OF EVIL CORP
Details Pdf 2021-12-29 252 PowerPoint Presentation
Details Website 2021-12-23 46 Logs of Log4shell (CVE-2021-44228): log4j is ubiquitous [EN]
Details Website 2021-12-12 36 Lacework Labs Identifies Log4J Attacks
Details Website 2021-12-12 32 The hidden side of Seclogon part 2: Abusing leaked handles to dump LSASS memory
Details Website 2021-12-06 10 How File Hashes Fail As A Malware Detection Heuristic
Details Pdf 2021-11-15 358 12271_Blackberry_ContellatingBooklet_FULL_ModifiedLinks.indd
Details Website 2021-10-18 47 Resource Based Constrained Delegation
Details Website 2021-10-12 15 The 2021 Contributor Contest :: Velociraptor - Digging deeper!