Common Information
Type | Value |
---|---|
Value |
Ўзбекистон Республикаси |
Category | Target |
Type | Target-Information |
Misp Type | Cluster |
Description | None |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2021-09-09 | 52 | CloudFall Campaign Targets Researchers and Scientists | Blog | ||
Details | Website | 2021-08-16 | 1 | The Ominous signs of a potential Inter-State Cyberwar - Checkmate | ||
Details | Website | 2021-08-12 | 14 | IT threat evolution in Q2 2021. Mobile statistics | ||
Details | Website | 2021-08-12 | 32 | IT threat evolution in Q2 2021. PC statistics | ||
Details | Website | 2021-08-10 | 105 | UNC215: Spotlight on a Chinese Espionage Campaign in Israel | Mandiant | ||
Details | Website | 2021-07-16 | 12 | REvil Ransomware Uses DLL Sideloading | McAfee Blog | ||
Details | Website | 2021-07-15 | 47 | Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware - Microsoft Security Blog | ||
Details | Website | 2021-07-13 | 7 | Candiru's Spyware: How It Works And Attacking Journalists, Activists And Many More | ||
Details | Website | 2021-06-10 | 117 | BackdoorDiplomacy: Upgrading from Quarian to Turian | WeLiveSecurity | ||
Details | Website | 2021-04-23 | 0 | Ransomware by the numbers: Reassessing the threat’s global impact | ||
Details | Website | 2021-03-31 | 0 | Financial Cyberthreats in 2020 | ||
Details | Website | 2021-02-25 | 106 | The Continuous Conundrum of Cloud Atlas - DomainTools | Start Here. Know Now. | ||
Details | Website | 2021-01-07 | 35 | Meet Oski Stealer: An In-depth Analysis of the Popular Credential Stealer | ||
Details | Website | 2020-12-21 | 0 | Cyber mercenaries don’t deserve immunity - Microsoft On the Issues | ||
Details | Website | 2020-12-09 | 21 | Russian APT Uses COVID-19 Lures to Deliver Zebrocy - Intezer | ||
Details | Website | 2020-11-11 | 3 | Targeted ransomware: it’s not just about encrypting your data! | ||
Details | Website | 2020-09-03 | 20 | IT threat evolution Q2 2020. PC statistics | ||
Details | Website | 2020-05-21 | 14 | Asnarök attackers twice modified attack midstream | ||
Details | Website | 2020-05-20 | 26 | IT threat evolution Q1 2020. Statistics | ||
Details | Website | 2020-04-06 | 11 | Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather than Skill — Intelligence for Vulnerability Management, Part One | Mandiant | ||
Details | Website | 2020-03-12 | 53 | Targeted Surveillance Attacks in Uzbekistan: An Old Threat with New Techniques | ||
Details | Website | 2019-11-29 | 37 | IT threat evolution Q3 2019. Statistics | ||
Details | Website | 2019-11-05 | 6 | Buran Ransomware; the Evolution of VegaLocker | McAfee Blog | ||
Details | Website | 2019-10-03 | 3 | Researchers Say They Uncovered Uzbekistan Hacking Operations Due to Spectacularly Bad OPSEC | ||
Details | Website | 2019-08-28 | 4 | Inside Classiscam |