Common Information
Type | Value |
---|---|
Value |
Data Encrypted |
Category | Cmtmf-Attack-Pattern |
Type | Cmtmf-Attack-Pattern |
Misp Type | Cluster |
Description | TBD |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2019-08-07 | 0 | Digital skimmers: Keeping card details safe online | ||
Details | Website | 2019-04-30 | 281 | Buhtrap backdoor and Buran ransomware distributed via major advertising platform | WeLiveSecurity | ||
Details | Website | 2019-04-22 | 48 | CB TAU Threat Intelligence Notification: HopLight Campaign (Linked to North Korea) is Reusing Substantial Amount of Code | ||
Details | Website | 2019-04-16 | 49 | DNS Tunneling in the Wild: Overview of OilRig’s DNS Tunneling | ||
Details | Website | 2019-03-20 | 2 | Who will restore encrypted corporate data? Nobody will | ||
Details | Website | 2019-03-11 | 60 | Gaming industry still in the scope of attackers in Asia | WeLiveSecurity | ||
Details | Website | 2019-03-06 | 3 | MachineAccountQuota is USEFUL Sometimes: Exploiting One of Active Directory's Oddest Settings | ||
Details | Website | 2018-12-12 | 18 | ‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure | McAfee Blog | ||
Details | Website | 2018-11-20 | 19 | Analyzing the GreyEnergy Malware: from Maldoc to Backdoor – Nozomi Networks | ||
Details | Website | 2018-11-13 | 0 | Miercom Verifies Performance of Cisco Branch Office Routers vs. Huawei and HPE | ||
Details | Website | 2018-11-08 | 0 | Cisco Webex Teams Security Keeps Data and Teams Safe | ||
Details | Website | 2018-11-02 | 22 | MCrypt2018 | ||
Details | Website | 2018-06-19 | 0 | North American Malware Trends: A Proactive Approach | ||
Details | Website | 2018-03-02 | 70 | McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups | McAfee Blog | ||
Details | Website | 2018-02-21 | 6 | DataKeeper | ||
Details | Website | 2018-01-17 | 0 | SnagRide’s solution to long distance ride sharing | ||
Details | Website | 2017-11-03 | 35 | Credential phishing and an Android banking Trojan combine in Austrian mobile attacks | Proofpoint US | ||
Details | Website | 2017-10-27 | 1 | Bad Rabbit Ransomware – What is it and how to stay safe | Trend Micro News | ||
Details | Website | 2017-10-09 | 0 | On the PGP cipher preferences, and a gaffe | ||
Details | Website | 2017-09-20 | 4 | The Formidable FormBook Form Grabber | NETSCOUT | ||
Details | Website | 2017-09-12 | 8 | JavaScript for Microcontrollers and IoT: SSL/TLS | ||
Details | Website | 2017-06-28 | 9 | Security Alert: New Petya ransomware outbreak combines attack vectors, delivers malware cocktail | ||
Details | Website | 2017-06-27 | 0 | Petya variants behind global ransomware outbreak | ||
Details | Website | 2017-05-25 | 22 | Dridex: A History of Evolution | ||
Details | Website | 2017-05-13 | 7 | Security Alert: WannaCry Leaves Exploited Computers Vulnerable to Round Two |