Common Information
Type Value
Value
Masquerading
Category Cmtmf-Attack-Pattern
Type Cmtmf-Attack-Pattern
Misp Type Cluster
Description TBD
Details Published Attributes CTI Title
Details Website 2024-12-03 120 Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence
Details Website 2024-11-16 0 McAfee+ Advanced 2025 Review: Your Identity’s Best Friend
Details Website 2024-11-16 0 The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 87 Babble Babble Babble Babble Babble Babble BabbleLoader
Details Website 2024-11-15 4 New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant - SOC Prime
Details Website 2024-11-14 72 Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 35 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-14 1 Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware - Check Point Blog
Details Website 2024-11-14 3 Germany's Cyber Threat Landscape Grows Resilient Under Fire
Details Website 2024-11-14 34 New PXA Stealer targets government and education sectors for sensitive information
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog
Details Website 2024-11-13 0 Learn the Definition of Penetration Testing and Also Discover Stages, Techniques, Types, Benefits
Details Website 2024-11-13 0 Rhadamanthys Threat Actors Using Fake Copyright Infringement Emails
Details Website 2024-11-13 55 HawkEye | PredatorPain
Details Website 2024-11-12 1 Interlock Ransomware Detection: High-Profile and Double-Extortion Attacks Using a New Ransomware Variant - SOC Prime
Details Website 2024-11-12 0 Criminals Exploiting FBI Emergency Data Requests
Details Website 2024-11-12 35 Lock5 (Medusa Ransomware)
Details Website 2024-11-12 1 New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-11 3 Cyber Briefing: 2024.11.11
Details Website 2024-11-11 6 Threat Hunting Case Study: Uncovering Turla
Details Website 2024-11-08 5 Cybersecurity News Review — Week 45
Details Website 2024-11-08 4 Weekly Cybersecurity News
Details Website 2024-11-08 8 SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims - CyberSRC