Common Information
Type | Value |
---|---|
Value |
Masquerading |
Category | Cmtmf-Attack-Pattern |
Type | Cmtmf-Attack-Pattern |
Misp Type | Cluster |
Description | TBD |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-03 | 120 | Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-16 | 0 | McAfee+ Advanced 2025 Review: Your Identity’s Best Friend | ||
Details | Website | 2024-11-16 | 0 | The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World | ||
Details | Website | 2024-11-15 | 87 | Babble Babble Babble Babble Babble Babble BabbleLoader | ||
Details | Website | 2024-11-15 | 87 | Babble Babble Babble Babble Babble Babble BabbleLoader | ||
Details | Website | 2024-11-15 | 4 | New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant - SOC Prime | ||
Details | Website | 2024-11-14 | 72 | Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-14 | 35 | New PXA Stealer targets government and education sectors for sensitive information | ||
Details | Website | 2024-11-14 | 1 | Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware - Check Point Blog | ||
Details | Website | 2024-11-14 | 3 | Germany's Cyber Threat Landscape Grows Resilient Under Fire | ||
Details | Website | 2024-11-14 | 34 | New PXA Stealer targets government and education sectors for sensitive information | ||
Details | Website | 2024-11-13 | 55 | HawkEye Malware: Technical Analysis | ||
Details | Website | 2024-11-13 | 55 | HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2024-11-13 | 0 | Learn the Definition of Penetration Testing and Also Discover Stages, Techniques, Types, Benefits | ||
Details | Website | 2024-11-13 | 0 | Rhadamanthys Threat Actors Using Fake Copyright Infringement Emails | ||
Details | Website | 2024-11-13 | 55 | HawkEye | PredatorPain | ||
Details | Website | 2024-11-12 | 1 | Interlock Ransomware Detection: High-Profile and Double-Extortion Attacks Using a New Ransomware Variant - SOC Prime | ||
Details | Website | 2024-11-12 | 0 | Criminals Exploiting FBI Emergency Data Requests | ||
Details | Website | 2024-11-12 | 35 | Lock5 (Medusa Ransomware) | ||
Details | Website | 2024-11-12 | 1 | New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-11 | 3 | Cyber Briefing: 2024.11.11 | ||
Details | Website | 2024-11-11 | 6 | Threat Hunting Case Study: Uncovering Turla | ||
Details | Website | 2024-11-08 | 5 | Cybersecurity News Review — Week 45 | ||
Details | Website | 2024-11-08 | 4 | Weekly Cybersecurity News | ||
Details | Website | 2024-11-08 | 8 | SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims - CyberSRC |