ENISA THREAT LANDSCAPE 2024
Common Information
Type | Value |
---|---|
UUID | 2495676b-2fb0-4f65-b00b-0ce70273a550 |
Fingerprint | 28b9cb3f8b12bac1ccae84ef1b36b74dfa5c53a3594e8634905c60e6f7ba1821 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Sept. 17, 2024, 5:58 p.m. |
Added to db | Sept. 19, 2024, 7:07 p.m. |
Last updated | Sept. 19, 2024, 7:16 p.m. |
Headline | ENISA THREAT LANDSCAPE 2024 |
Title | ENISA THREAT LANDSCAPE 2024 |
Detected Hints/Tags/Attributes | 858/4/770 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 53 | cve-2023-42793 |
|
Details | CVE | 2 | cve-2023-233397 |
|
Details | CVE | 117 | cve-2023-2868 |
|
Details | CVE | 31 | cve-2023-34048 |
|
Details | CVE | 55 | cve-2023-46747 |
|
Details | CVE | 38 | cve-2024-3400 |
|
Details | CVE | 67 | cve-2023-44487 |
|
Details | Domain | 34 | www.enisa.europa.eu |
|
Details | Domain | 7 | enisa.europa.eu |
|
Details | Domain | 55 | creativecommons.org |
|
Details | Domain | 15 | www.misp-project.org |
|
Details | Domain | 4127 | github.com |
|
Details | Domain | 12 | europa.eu |
|
Details | Domain | 11 | blog.f-secure.com |
|
Details | Domain | 35 | www.europol.europa.eu |
|
Details | Domain | 4 | www.uscert.gov |
|
Details | Domain | 2 | ncsc.nl |
|
Details | Domain | 167 | www.ic3.gov |
|
Details | Domain | 101 | www.group-ib.com |
|
Details | Domain | 54 | lists.debian.org |
|
Details | Domain | 219 | gist.github.com |
|
Details | Domain | 182 | www.mandiant.com |
|
Details | Domain | 36 | decoded.avast.io |
|
Details | Domain | 71 | blogs.jpcert.or.jp |
|
Details | Domain | 1 | apiiro.com |
|
Details | Domain | 21 | cyware.com |
|
Details | Domain | 101 | cert.pl |
|
Details | Domain | 28 | eur-lex.europa.eu |
|
Details | Domain | 1 | ciras.enisa.europa.eu |
|
Details | Domain | 469 | www.cisa.gov |
|
Details | Domain | 546 | www.recordedfuture.com |
|
Details | Domain | 7 | www.picussecurity.com |
|
Details | Domain | 10 | go.crowdstrike.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 261 | blog.talosintelligence.com |
|
Details | Domain | 224 | unit42.paloaltonetworks.com |
|
Details | Domain | 65 | www.cert.ssi.gouv.fr |
|
Details | Domain | 50 | cloud.google.com |
|
Details | Domain | 13 | mockbin.org |
|
Details | Domain | 7 | mocky.io |
|
Details | Domain | 4 | blogs.security.com |
|
Details | Domain | 262 | www.welivesecurity.com |
|
Details | Domain | 397 | www.microsoft.com |
|
Details | Domain | 98 | www.ncsc.gov.uk |
|
Details | Domain | 22 | www.genians.co.kr |
|
Details | Domain | 55 | blog.google |
|
Details | Domain | 4 | www.ncsc.nl |
|
Details | Domain | 434 | medium.com |
|
Details | Domain | 84 | www.zscaler.com |
|
Details | Domain | 141 | research.checkpoint.com |
|
Details | Domain | 25 | www.cyberark.com |
|
Details | Domain | 37 | www.blackberry.com |
|
Details | Domain | 58 | blog.sekoia.io |
|
Details | Domain | 12 | www.dni.gov |
|
Details | Domain | 2 | www.thebureauinvestigates.com |
|
Details | Domain | 2 | www.iccl.ie |
|
Details | Domain | 27 | apnews.com |
|
Details | Domain | 4 | www.sgdsn.gouv.fr |
|
Details | Domain | 67 | citizenlab.ca |
|
Details | Domain | 37 | openai.com |
|
Details | Domain | 40 | edition.cnn.com |
|
Details | Domain | 66 | www.malwarebytes.com |
|
Details | Domain | 1 | blog.unpac.me |
|
Details | Domain | 172 | www.crowdstrike.com |
|
Details | Domain | 1 | ia.acs.org.au |
|
Details | Domain | 13 | blog.lumen.com |
|
Details | Domain | 144 | www.fortinet.com |
|
Details | Domain | 6 | sec.okta.com |
|
Details | Domain | 8 | www.humansecurity.com |
|
Details | Domain | 19 | cybersecurity.att.com |
|
Details | Domain | 41 | arcticwolf.com |
|
Details | Domain | 1 | go.flashpoint.io |
|
Details | Domain | 7 | www.fsisac.com |
|
Details | Domain | 124 | www.sentinelone.com |
|
Details | Domain | 189 | asec.ahnlab.com |
|
Details | Domain | 370 | www.proofpoint.com |
|
Details | Domain | 16 | www.verizon.com |
|
Details | Domain | 58 | redcanary.com |
|
Details | Domain | 103 | www.mcafee.com |
|
Details | Domain | 403 | securelist.com |
|
Details | Domain | 6 | www.nccgroup.com |
|
Details | Domain | 56 | www.dragos.com |
|
Details | Domain | 1 | netenrich.com |
|
Details | Domain | 1 | www.wiley.law |
|
Details | Domain | 128 | www.bitdefender.com |
|
Details | Domain | 2 | www.group |
|
Details | Domain | 2 | ib.com |
|
Details | Domain | 1 | underthebreach.medium.com |
|
Details | Domain | 59 | www.cybereason.com |
|
Details | Domain | 1 | www.acice-asean.org |
|
Details | Domain | 3 | journals.sagepub.com |
|
Details | Domain | 2 | transparency.meta.com |
|
Details | Domain | 1 | securitylab.amnesty.org |
|
Details | Domain | 1 | edri.org |
|
Details | Domain | 49 | home.treasury.gov |
|
Details | Domain | 17 | www.politico.eu |
|
Details | Domain | 14 | time.com |
|
Details | Domain | 11 | services.google.com |
|
Details | Domain | 280 | thehackernews.com |
|
Details | Domain | 2 | www.secalliance.com |
|
Details | Domain | 53 | blogs.blackberry.com |
|
Details | Domain | 9 | www.jpost.com |
|
Details | Domain | 243 | cve.mitre.org |
|
Details | Domain | 169 | www.first.org |
|
Details | Domain | 641 | nvd.nist.gov |
|
Details | Domain | 35 | first.org |
|
Details | Domain | 55 | cwe.mitre.org |
|
Details | Domain | 571 | www.cve.org |
|
Details | Domain | 154 | arxiv.org |
|
Details | Domain | 14 | www.guidepointsecurity.com |
|
Details | Domain | 13 | www.reliaquest.com |
|
Details | Domain | 99 | therecord.media |
|
Details | Domain | 39 | www.helpnetsecurity.com |
|
Details | Domain | 13 | quointelligence.eu |
|
Details | Domain | 1373 | twitter.com |
|
Details | Domain | 82 | csrc.nist.gov |
|
Details | Domain | 62 | nvlpubs.nist.gov |
|
Details | Domain | 360 | attack.mitre.org |
|
Details | Domain | 78 | socradar.io |
|
Details | Domain | 3 | gridinsoft.com |
|
Details | Domain | 1 | cybelangel.com |
|
Details | Domain | 911 | any.run |
|
Details | Domain | 20 | inquest.net |
|
Details | Domain | 35 | www.akamai.com |
|
Details | Domain | 7 | blog.phylum.io |
|
Details | Domain | 17 | www.threatfabric.com |
|
Details | Domain | 88 | securityintelligence.com |
|
Details | Domain | 27 | flare.io |
|
Details | Domain | 9 | darktrace.com |
|
Details | Domain | 29 | www.trellix.com |
|
Details | Domain | 138 | www.securityweek.com |
|
Details | Domain | 1 | recording.next |
|
Details | Domain | 8 | www.consilium.europa.eu |
|
Details | Domain | 1 | bics.com |
|
Details | Domain | 54 | www.scmagazine.com |
|
Details | Domain | 32 | paloaltonetworks.com |
|
Details | Domain | 41 | www.hhs.gov |
|
Details | Domain | 3 | www.domo.com |
|
Details | Domain | 40 | ieeexplore.ieee.org |
|
Details | Domain | 73 | techcrunch.com |
|
Details | Domain | 13 | surfshark.com |
|
Details | Domain | 1 | verfassungsschutz.de |
|
Details | Domain | 5 | blog.barracuda.com |
|
Details | Domain | 1 | fedtechmagazine.com |
|
Details | Domain | 3 | www.cobalt.io |
|
Details | Domain | 177 | www.wired.com |
|
Details | Domain | 11 | digital-strategy.ec.europa.eu |
|
Details | Domain | 11 | carnegieendowment.org |
|
Details | Domain | 45 | www.whitehouse.gov |
|
Details | Domain | 2 | www.immersivelabs.com |
|
Details | Domain | 6 | cybermagazine.com |
|
Details | Domain | 71 | cybernews.com |
|
Details | Domain | 133 | www.infosecurity-magazine.com |
|
Details | Domain | 1 | stormwall.network |
|
Details | Domain | 52 | blog.cloudflare.com |
|
Details | Domain | 61 | www.netscout.com |
|
Details | Domain | 5 | ddos-guard.net |
|
Details | Domain | 5 | www.accessnow.org |
|
Details | Domain | 21 | www.state.gov |
|
Details | Domain | 41 | www.imperva.com |
|
Details | Domain | 3 | www.cloudbric.com |
|
Details | Domain | 3 | www.networkcomputing.com |
|
Details | Domain | 4 | www.cdn.neustar |
|
Details | Domain | 11 | www3.weforum.org |
|
Details | Domain | 251 | www.bleepingcomputer.com |
|
Details | Domain | 1 | www.nexusguard.com |
|
Details | Domain | 1 | vercara.com |
|
Details | Domain | 3 | blog.qrator.net |
|
Details | Domain | 5 | www.disarm.foundation |
|
Details | Domain | 1 | vsquare.org |
|
Details | Domain | 6 | www.nature.com |
|
Details | Domain | 10 | www.atlanticcouncil.org |
|
Details | Domain | 1 | finance.ec.europa.eu |
|
Details | Domain | 2 | lex.europa.eu |
|
Details | Domain | 5 | euvsdisinfo.eu |
|
Details | Domain | 1 | www.ivir.nl |
|
Details | Domain | 3 | cdn.openai.com |
|
Details | Domain | 4 | www.newsguardtech.com |
|
Details | Domain | 1 | dfrlab.org |
|
Details | Domain | 3 | healthcyber.mitre.org |
|
Details | Domain | 4 | sot.mitre.org |
|
Details | Domain | 3 | pr.ir |
|
Details | Domain | 2 | id.im |
|
Details | Domain | 3 | rs.ma |
|
Details | Domain | 8 | rs.co |
|
Details | Domain | 4 | pr.ps |
|
Details | Domain | 30 | www.iso.org |
|
Details | Domain | 50 | www.nist.gov |
|
Details | Domain | 11 | de.ae |
|
Details | Domain | 10 | de.cm |
|
Details | Domain | 13 | id.am |
|
Details | Domain | 10 | pr.at |
|
Details | Domain | 3 | gv.sc |
|
Details | Domain | 4 | artificialintelligenceact.eu |
|
Details | Domain | 3 | www.wsav.com |
|
Details | Domain | 9 | rc.co |
|
Details | Domain | 5 | hacked.com |
|
Details | Domain | 13 | www.f5.com |
|
Details | Domain | 8 | www.aha.org |
|
Details | Domain | 3 | www.eeas.europa.eu |
|
Details | Domain | 7 | stixproject.github.io |
|
Details | Domain | 4 | www.apa.org |
|
Details | Domain | 15 | github.blog |
|
Details | 3 | etl@enisa.europa.eu |
||
Details | 3 | press@enisa.europa.eu |
||
Details | File | 2 | taxonomies.html |
|
Details | File | 5 | 2024.pdf |
|
Details | File | 5 | 2023_ic3report.pdf |
|
Details | File | 2 | msg00057.html |
|
Details | File | 1 | lazarus_pypi.html |
|
Details | File | 99 | cert.pl |
|
Details | File | 1 | globalthreatreport2024.pdf |
|
Details | File | 1 | earth-freybug.html |
|
Details | File | 6 | router-roulette.html |
|
Details | File | 141 | www.cer |
|
Details | File | 3 | certfr-2023-cti-009.pdf |
|
Details | File | 1 | pawn-storm-uses-brute-force-and-stealth.html |
|
Details | File | 1 | actors-adapt-tactics-for-initial-cloud-access.pdf |
|
Details | File | 1 | ata-2024-unclassified-report.pdf |
|
Details | File | 1 | network_eng_vf.pdf |
|
Details | File | 816 | index.html |
|
Details | File | 1 | expl.html |
|
Details | File | 1 | cyber-criminals-are-getting-faster.html |
|
Details | File | 1 | 4e9f02a5-641d-41f4-9d14-e264c0d9d4ea.pdf |
|
Details | File | 1 | accessencryptionexfiltrationmitigation.pdf |
|
Details | File | 1 | 2024-unit42-incident-response-report.pdf |
|
Details | File | 1 | fsisac-navcyber24-report.pdf |
|
Details | File | 2 | threat-actors-leverage-file-sharing-service-and-reverse-proxies.html |
|
Details | File | 1 | ransomware-propagates-to-vcenters-and-esxi-via-custom-pow.html |
|
Details | File | 1 | feb_24_info.pdf |
|
Details | File | 1 | matter-a-glance-into-the-spyware-industry.pdf |
|
Details | File | 3 | tool-of-first-resort-israel-hamas-war-cyber.pdf |
|
Details | File | 2 | apt44-unearthing-sandworm.pdf |
|
Details | File | 1 | a-new-age-of-hacktivism.html |
|
Details | File | 2 | cna.html |
|
Details | File | 2 | 8374-preliminary-draft.pdf |
|
Details | File | 2 | grit_ransomware_report_q1_2023.pdf |
|
Details | File | 1 | operation-cronos-aftermath.html |
|
Details | File | 1 | threatlabz-ransomware-report.pdf |
|
Details | File | 1 | ransomware-double-dip-re-victimization.html |
|
Details | File | 2 | 800-171r2.pdf |
|
Details | File | 1 | imaploader-malware.html |
|
Details | File | 1 | social-engineering_node.html |
|
Details | File | 9 | 2022_ic3report.pdf |
|
Details | File | 1 | video-fbi-take-down-uk-hacker-in-spain-for-stealing-27m-usd-of-bitcoins_1000077536-a.html |
|
Details | File | 1 | aa23-320a_scattered_spider_0.pdf |
|
Details | File | 1 | 231108.pdf |
|
Details | File | 1 | baza-r-call-campaigns-analyst-note.pdf |
|
Details | File | 20 | media.cer |
|
Details | File | 2 | tlp-white-cert-eu-threat_landscape_report-volume1.pdf |
|
Details | File | 1 | liability-495285.aspx |
|
Details | File | 104 | www.dat |
|
Details | File | 48 | www.spi |
|
Details | File | 384 | www.inf |
|
Details | File | 1 | threat_report_2h2023.pdf |
|
Details | File | 1 | iocta%202023%20-%20en_0.pdf |
|
Details | File | 1 | 2023-kio-report.pdf |
|
Details | File | 1 | fsisac_ddos-heretostay.pdf |
|
Details | File | 3 | neustar-cyber-threats-trends-2020-report.pdf |
|
Details | File | 2 | wef_the_global_risks_report_2022.pdf |
|
Details | File | 1 | intelligence-1.pdf |
|
Details | File | 1 | bedbug-panic-was-stoked-by-russia-says-france_6575870_7.html |
|
Details | File | 1 | 20240611_np_sgdsn_viginum_matriochka_en_vf.pdf |
|
Details | File | 1 | republic-of-china-seeks-to-reshape-the-global-information-environment_508.pdf |
|
Details | File | 1 | reshape-the-global-information-environment_508.pdf |
|
Details | File | 1 | abc_framework_2019_sept_2019.pdf |
|
Details | File | 2 | forecasting-misuse.pdf |
|
Details | File | 4 | pr.ps |
|
Details | File | 33 | www.iso |
|
Details | File | 2 | 20220124_itrc-2021-data-breach-report.pdf |
|
Details | File | 2 | 2022-data-breach-investigations-report-dbir.pdf |
|
Details | File | 2 | service-ddos-attacks-march-2021.pdf |
|
Details | Github username | 11 | misp |
|
Details | Github username | 1 | thesamesam |
|
Details | Github username | 2 | mattiwatti |
|
Details | Github username | 1 | fin3ss3g0d |
|
Details | Github username | 3 | blackorbird |
|
Details | Github username | 3 | circl |
|
Details | md5 | 1 | 223949d5a074ebc3dce9ee78baad9e27 |
|
Details | md5 | 1 | 96de49e381cfa357fcd6d0e7d8ff1e48 |
|
Details | Mandiant Uncategorized Groups | 54 | UNC4841 |
|
Details | Mandiant Uncategorized Groups | 52 | UNC3886 |
|
Details | Mandiant Uncategorized Groups | 3 | UNC4990 |
|
Details | MITRE ATT&CK Techniques | 56 | T1587 |
|
Details | MITRE ATT&CK Techniques | 542 | T1190 |
|
Details | MITRE ATT&CK Techniques | 191 | T1133 |
|
Details | MITRE ATT&CK Techniques | 409 | T1566 |
|
Details | MITRE ATT&CK Techniques | 52 | T1199 |
|
Details | MITRE ATT&CK Techniques | 239 | T1106 |
|
Details | MITRE ATT&CK Techniques | 310 | T1047 |
|
Details | MITRE ATT&CK Techniques | 40 | T1197 |
|
Details | MITRE ATT&CK Techniques | 16 | T1554 |
|
Details | MITRE ATT&CK Techniques | 86 | T1136 |
|
Details | MITRE ATT&CK Techniques | 116 | T1134 |
|
Details | MITRE ATT&CK Techniques | 208 | T1068 |
|
Details | MITRE ATT&CK Techniques | 440 | T1055 |
|
Details | MITRE ATT&CK Techniques | 504 | T1140 |
|
Details | MITRE ATT&CK Techniques | 48 | T1480 |
|
Details | MITRE ATT&CK Techniques | 348 | T1036 |
|
Details | MITRE ATT&CK Techniques | 550 | T1112 |
|
Details | MITRE ATT&CK Techniques | 627 | T1027 |
|
Details | MITRE ATT&CK Techniques | 91 | T1620 |
|
Details | MITRE ATT&CK Techniques | 238 | T1497 |
|
Details | MITRE ATT&CK Techniques | 172 | T1555 |
|
Details | MITRE ATT&CK Techniques | 99 | T1539 |
|
Details | MITRE ATT&CK Techniques | 179 | T1087 |
|
Details | MITRE ATT&CK Techniques | 29 | T1217 |
|
Details | MITRE ATT&CK Techniques | 176 | T1135 |
|
Details | MITRE ATT&CK Techniques | 65 | T1069 |
|
Details | MITRE ATT&CK Techniques | 433 | T1057 |
|
Details | MITRE ATT&CK Techniques | 501 | T1012 |
|
Details | MITRE ATT&CK Techniques | 185 | T1518 |
|
Details | MITRE ATT&CK Techniques | 50 | T1614 |
|
Details | MITRE ATT&CK Techniques | 230 | T1033 |
|
Details | MITRE ATT&CK Techniques | 86 | T1124 |
|
Details | MITRE ATT&CK Techniques | 109 | T1210 |
|
Details | MITRE ATT&CK Techniques | 33 | T1080 |
|
Details | MITRE ATT&CK Techniques | 157 | T1560 |
|
Details | MITRE ATT&CK Techniques | 19 | T1530 |
|
Details | MITRE ATT&CK Techniques | 56 | T1213 |
|
Details | MITRE ATT&CK Techniques | 67 | T1039 |
|
Details | MITRE ATT&CK Techniques | 219 | T1113 |
|
Details | MITRE ATT&CK Techniques | 22 | T1429 |
|
Details | MITRE ATT&CK Techniques | 2 | T1645 |
|
Details | MITRE ATT&CK Techniques | 14 | T1624.001 |
|
Details | MITRE ATT&CK Techniques | 10 | T1404 |
|
Details | MITRE ATT&CK Techniques | 2 | T1644 |
|
Details | MITRE ATT&CK Techniques | 3 | T1636.001 |
|
Details | MITRE ATT&CK Techniques | 27 | T1568 |
|
Details | MITRE ATT&CK Techniques | 159 | T1095 |
|
Details | MITRE ATT&CK Techniques | 444 | T1071 |
|
Details | MITRE ATT&CK Techniques | 50 | T1072 |
|
Details | MITRE ATT&CK Techniques | 152 | T1090 |
|
Details | MITRE ATT&CK Techniques | 149 | T1102 |
|
Details | MITRE ATT&CK Techniques | 422 | T1041 |
|
Details | MITRE ATT&CK Techniques | 93 | T1485 |
|
Details | MITRE ATT&CK Techniques | 31 | T1499 |
|
Details | MITRE ATT&CK Techniques | 197 | T1489 |
|
Details | MITRE ATT&CK Techniques | 12 | T1636.002 |
|
Details | MITRE ATT&CK Techniques | 17 | T1636.003 |
|
Details | MITRE ATT&CK Techniques | 23 | T1418 |
|
Details | MITRE ATT&CK Techniques | 6 | T1409 |
|
Details | MITRE ATT&CK Techniques | 13 | T1422 |
|
Details | MITRE ATT&CK Techniques | 10 | T1512 |
|
Details | MITRE ATT&CK Techniques | 36 | T1595 |
|
Details | MITRE ATT&CK Techniques | 50 | T1592 |
|
Details | MITRE ATT&CK Techniques | 34 | T1589 |
|
Details | MITRE ATT&CK Techniques | 33 | T1590 |
|
Details | MITRE ATT&CK Techniques | 14 | T1591 |
|
Details | MITRE ATT&CK Techniques | 100 | T1598 |
|
Details | MITRE ATT&CK Techniques | 4 | T1597 |
|
Details | MITRE ATT&CK Techniques | 8 | T1596 |
|
Details | MITRE ATT&CK Techniques | 17 | T1593 |
|
Details | MITRE ATT&CK Techniques | 14 | T1594 |
|
Details | MITRE ATT&CK Techniques | 66 | T1583 |
|
Details | MITRE ATT&CK Techniques | 36 | T1586 |
|
Details | MITRE ATT&CK Techniques | 66 | T1584 |
|
Details | MITRE ATT&CK Techniques | 13 | T1585 |
|
Details | MITRE ATT&CK Techniques | 145 | T1588 |
|
Details | MITRE ATT&CK Techniques | 46 | T1608 |
|
Details | MITRE ATT&CK Techniques | 306 | T1078 |
|
Details | MITRE ATT&CK Techniques | 420 | T1204 |
|
Details | MITRE ATT&CK Techniques | 5 | T1599 |
|
Details | MITRE ATT&CK Techniques | 534 | T1005 |
|
Details | MITRE ATT&CK Techniques | 34 | T1025 |
|
Details | MITRE ATT&CK Techniques | 67 | T1074 |
|
Details | MITRE ATT&CK Techniques | 102 | T1020 |
|
Details | MITRE ATT&CK Techniques | 92 | T1048 |
|
Details | MITRE ATT&CK Techniques | 7 | T1011 |
|
Details | MITRE ATT&CK Techniques | 6 | T1052 |
|
Details | MITRE ATT&CK Techniques | 126 | T1567 |
|
Details | MITRE ATT&CK Techniques | 22 | T1029 |
|
Details | MITRE ATT&CK Techniques | 33 | T1537 |
|
Details | MITRE ATT&CK Techniques | 56 | T1553 |
|
Details | MITRE ATT&CK Techniques | 58 | T1498 |
|
Details | MITRE ATT&CK Techniques | 183 | T1189 |
|
Details | MITRE ATT&CK Techniques | 168 | T1046 |
|
Details | MITRE ATT&CK Techniques | 21 | T1557 |
|
Details | MITRE ATT&CK Techniques | 245 | T1203 |
|
Details | MITRE ATT&CK Techniques | 33 | T1565 |
|
Details | MITRE ATT&CK Techniques | 65 | T1491 |
|
Details | MITRE ATT&CK Techniques | 52 | T1195 |
|
Details | MITRE ATT&CK Techniques | 8 | T1200 |
|
Details | Microsoft Threat Actor Naming Taxonomy (Groups in development) | 26 | Storm-1359 |
|
Details | Threat Actor Identifier - APT | 665 | APT29 |
|
Details | Threat Actor Identifier - APT | 783 | APT28 |
|
Details | Threat Actor Identifier - APT | 20 | APT44 |
|
Details | Threat Actor Identifier by Red Alert | 1 | Sector540 |
|
Details | Url | 4 | https://creativecommons.org/licenses/by/4.0 |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/enisa-threat-landscape-methodology. |
|
Details | Url | 2 | https://www.enisa.europa.eu/publications/enisa-threat-landscape- |
|
Details | Url | 2 | https://www.misp-project.org/taxonomies.html#_estimative_language |
|
Details | Url | 2 | https://github.com/misp/misp-galaxy. |
|
Details | Url | 2 | https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks. |
|
Details | Url | 1 | https://blog.f-secure.com/data-breach-and-data-leak-whats-the-difference. |
|
Details | Url | 2 | https://www.upguard.com/blog/data-breach-vs-data-leak#: |
|
Details | Url | 2 | https://www.europol.europa.eu/activities-services/main-reports/internet- |
|
Details | Url | 2 | https://www.uscert.gov/ncas/tips/st04-015. |
|
Details | Url | 5 | https://www.ic3.gov/media/pdf/annualreport/2023_ic3report.pdf |
|
Details | Url | 1 | https://www.group-ib.com/resources/research-hub/hi-tech-crime-trends-2023-eu |
|
Details | Url | 2 | https://lists.debian.org/debian-security-announce/2024/msg00057.html |
|
Details | Url | 1 | https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 |
|
Details | Url | 1 | https://openssf.org/blog/2024/04/15/open-source-security-openssf-and-openjs-foundations-issue-alert-for-social- |
|
Details | Url | 4 | https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023 |
|
Details | Url | 1 | https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005 |
|
Details | Url | 1 | https://decoded.avast.io/janrubin/guptiminer-hijacking-antivirus- |
|
Details | Url | 1 | https://blogs.jpcert.or.jp/en/2024/02/lazarus_pypi.html |
|
Details | Url | 1 | https://apiiro.com/blog/malicious-code-campaign-github-repo- |
|
Details | Url | 1 | https://cyware.com/news/north- |
|
Details | Url | 1 | https://cert.pl/en/posts/2023/12/apt29-teamcity |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve- |
|
Details | Url | 3 | https://eur-lex.europa.eu/legal-content/en/txt/pdf/?uri=celex:32022l2555 |
|
Details | Url | 1 | https://ciras.enisa.europa.eu |
|
Details | Url | 1 | https://www.cisa.gov/topics/physical-security/insider-threat-mitigation |
|
Details | Url | 2 | https://www.mandiant.com/m-trends. |
|
Details | Url | 1 | https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a. |
|
Details | Url | 1 | https://www.mandiant.com/resources/blog/gru-disruptive-playbook. |
|
Details | Url | 1 | https://www.recordedfuture.com/2023-adversary-infrastructure-report. |
|
Details | Url | 1 | https://www.picussecurity.com/resource/report/picus-red-report-2024. |
|
Details | Url | 1 | https://go.crowdstrike.com/rs/281-obq-266/images/globalthreatreport2024.pdf |
|
Details | Url | 1 | https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/. |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/24/d/earth-freybug.html |
|
Details | Url | 1 | https://blog.talosintelligence.com/arcanedoor-new-espionage- |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/. |
|
Details | Url | 5 | https://www.trendmicro.com/en_us/research/24/e/router-roulette.html |
|
Details | Url | 3 | https://www.cert.ssi.gouv.fr/uploads/certfr-2023-cti-009.pdf |
|
Details | Url | 1 | https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-orb-networks/. |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/stately-taurus-targets-philippines-government-cyberespionage/. |
|
Details | Url | 1 | https://www.mandiant.com/resources/blog/apt29-evolving-diplomatic-phishing. |
|
Details | Url | 1 | https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/. |
|
Details | Url | 1 | https://www.recordedfuture.com/flying-under-the-radar-abusing-github-malicious-infrastructure. |
|
Details | Url | 1 | https://cert.pl/en/posts/2024/05/apt28-campaign/. |
|
Details | Url | 1 | https://www.welivesecurity.com/en/eset- |
|
Details | Url | 1 | https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-046a. |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/blog/2023/09/14/peach- |
|
Details | Url | 1 | https://www.trendmicro.com/en_in/research/24/a/pawn-storm-uses-brute-force-and-stealth.html |
|
Details | Url | 2 | https://www.cisa.gov/news-events/cybersecurity- |
|
Details | Url | 1 | https://www.ncsc.gov.uk/files/advisory-svr-cyber- |
|
Details | Url | 4 | https://www.microsoft.com/en- |
|
Details | Url | 1 | https://www.genians.co.kr/blog/threat_intelligence/facebook. |
|
Details | Url | 1 | https://blog.google/technology/safety-security/a-review-of- |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/russian-apt- |
|
Details | Url | 2 | https://blog.google/threat-analysis- |
|
Details | Url | 1 | https://www.ncsc.nl/documenten/publicaties/2024/februari/6/mivd- |
|
Details | Url | 1 | https://www.enisa.europa.eu/news/joint-statement-on-ivanti. |
|
Details | Url | 1 | https://www.cisa.gov/news-events/directives/supplemental-direction-v1-ed- |
|
Details | Url | 1 | https://www.mandiant.com/resources/blog/unc4841-post-barracuda-zero-day-remediation. |
|
Details | Url | 4 | https://www.cisa.gov/news- |
|
Details | Url | 1 | https://www.mandiant.com/resources/blog/chinese-vmware-exploitation-since-2021. |
|
Details | Url | 1 | https://medium.com/mitre- |
|
Details | Url | 1 | https://blog.talosintelligence.com/lazarus-quiterat/. |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/blog/2023/08/24/flax- |
|
Details | Url | 2 | https://www.zscaler.com/blogs/security- |
|
Details | Url | 1 | https://www.kroll.com/en/insights/publications/cyber/screenconnect-vulnerability-exploited-to-deploy-babyshark. |
|
Details | Url | 1 | https://research.checkpoint.com/2023/elections- |
|
Details | Url | 1 | https://www.cyberark.com/resources/blog/election-security-defending-democracy-in- |
|
Details | Url | 1 | https://www.blackberry.com/us/en/solutions/threat-intelligence/threat-report. |
|
Details | Url | 1 | https://blog.sekoia.io/master-of-puppets-uncovering-the-doppelganger-pro-russian-influence-campaign/. |
|
Details | Url | 1 | https://www.dni.gov/files/odni/documents/assessments/ata-2024-unclassified-report.pdf |
|
Details | Url | 1 | https://www.thebureauinvestigates.com/stories/2023-07-27/what-are-influence- |
|
Details | Url | 1 | https://www.iccl.ie/2023/new-iccl-reports-reveal-serious-security-threat-to-the-eu- |
|
Details | Url | 1 | https://apnews.com/article/france- |
|
Details | Url | 1 | https://www.sgdsn.gouv.fr/files/files/20240212_np_sgdsn_viginum_portal-kombat- |
|
Details | Url | 1 | https://citizenlab.ca/2024/02/paperwall-chinese- |
|
Details | Url | 1 | https://www.gartner.com/en/newsroom/press-releases/2024-02-13-gartner-forecasts-security-and-risk-management- |
|
Details | Url | 1 | https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat |
|
Details | Url | 1 | https://openai.com/blog/disrupting-malicious- |
|
Details | Url | 1 | https://edition.cnn.com/2024/02/01/politics/election-deepfake-threats-invs/index.html |
|
Details | Url | 1 | https://blogs.microsoft.com/on-the-issues/2024/04/04/china-ai-influence-elections-mtac-cybersecurity/. |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/24/a/kasseika-ransomware-deploys-byovd-attacks-abuses-psexec-and- |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/medusa-ransomware- |
|
Details | Url | 1 | https://www.malwarebytes.com/blog/business/2024/02/why- |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion- |
|
Details | Url | 1 | https://blog.unpac.me/2024/01/30/malware-trends-yearly/. |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/glupteba-malware-uefi-bootkit |
|
Details | Url | 1 | https://github.com/mattiwatti/efiguard. |
|
Details | Url | 1 | https://www.crowdstrike.com/resources/reports/threat-hunting-report/. |
|
Details | Url | 1 | https://ia.acs.org.au/article/2023/cyber-criminals-are-getting-faster.html |
|
Details | Url | 1 | https://www.welivesecurity.com/en/cybersecurity/year-review-10-biggest-security-incidents-2023/. |
|
Details | Url | 1 | https://cloud.google.com/blog/topics/threat- |
|
Details | Url | 1 | https://blog.lumen.com/the-darkside-of-themoon/. |
|
Details | Url | 1 | https://www.fortinet.com/blog/threat-research/new-goldoon-botnet-targeting-d-link-devices. |
|
Details | Url | 1 | https://sec.okta.com/blockanonymizers. |
|
Details | Url | 1 | https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-proxylib- |
|
Details | Url | 1 | https://cybersecurity.att.com/blogs/labs-research/mac- |
|
Details | Url | 1 | https://arcticwolf.com/resource/_pfcdn/assets/preprocessed/10926/4e9f02a5- |
|
Details | Url | 1 | https://go.flashpoint.io/2024-global-threat-intelligence-report-download. |
|
Details | Url | 1 | https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities. |
|
Details | Url | 1 | https://www.fsisac.com/hubfs/knowledge/lockbit- |
|
Details | Url | 1 | https://www.sentinelone.com/blog/moveit-transfer-exploited-to-drop-file-stealing-sql-shell/. |
|
Details | Url | 1 | https://asec.ahnlab.com/en/64034/. |
|
Details | Url | 1 | https://www.ncsc.gov.uk/blog-post/smart-devices-law. |
|
Details | Url | 1 | https://www.paloaltonetworks.com/content/dam/pan/en_us/assets/pdf/reports/2024-unit42-incident-response-report.pdf |
|
Details | Url | 1 | https://www.proofpoint.com/us/blog/identity-threat-defense/rise-in-identity-threats. |
|
Details | Url | 1 | https://www.verizon.com/business/resources/reports/dbir/. |
|
Details | Url | 1 | https://redcanary.com/blog/2024-threat-detection-report/. |
|
Details | Url | 1 | https://www.proofpoint.com/uk/blog/cloud- |
|
Details | Url | 1 | https://blog.talosintelligence.com/coralraider- |
|
Details | Url | 1 | https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud- |
|
Details | Url | 1 | https://www.group-ib.com/resources/research-hub/hi-tech-crime-trends-2023-eu/. |
|
Details | Url | 1 | https://decoded.avast.io/threatresearch/avast-q1-2024-threat-report/. |
|
Details | Url | 1 | https://research.checkpoint.com/2023/the- |
|
Details | Url | 1 | https://www.fsisac.com/hubfs/knowledge/navigatingcyber/2024/fsisac-navcyber24-report.pdf |
|
Details | Url | 1 | https://github.com/fin3ss3g0d/evilgophish?tab=readme |
|
Details | Url | 2 | https://www.trendmicro.com/en_us/research/23/k/threat-actors-leverage-file-sharing-service-and-reverse-proxies.html |
|
Details | Url | 1 | https://blog.talosintelligence.com/threat-actors-leveraging-document-publishing-sites/. |
|
Details | Url | 2 | https://unit42.paloaltonetworks.com/url-delivered-ransomware/. |
|
Details | Url | 1 | https://www.mandiant.com/resources/blog/unc4990-evolution-usb-malware. |
|
Details | Url | 1 | https://www.sentinelone.com/blog/exploiting-repos-6-ways-threat-actors-abuse-github-other-devops-platforms/. |
|
Details | Url | 1 | https://www.darkreading.com/threat-intelligence/hackers-create-legit-phishing-links-with-ghost-github-gitlab-comments. |
|
Details | Url | 1 | https://www.mcafee.com/blogs/other-blogs/mcafee-labs/redline-stealer-a- |
|
Details | Url | 1 | https://blog.talosintelligence.com/google-cloud-run-abuse/. |
|
Details | Url | 1 | https://www.netskope.com/blog/phishing-with-cloudflare-workers-transparent-phishing-and-html-smuggling. |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/24/c/agenda- |
|
Details | Url | 1 | https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a. |
|
Details | Url | 1 | https://www.sentinelone.com/blog/from-conti-to-akira-decoding-the-latest-linux-esxi-ransomware-families/. |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest- |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/blackcat-ransomware- |
|
Details | Url | 1 | https://securelist.com/network-tunneling-with-qemu/111803/. |
|
Details | Url | 1 | https://www.nccgroup.com/us/threat-monitor-report-2023/. |
|
Details | Url | 1 | https://www.dragos.com/blog/dragos-industrial- |
|
Details | Url | 1 | https://netenrich.com/blog/red-cryptoapp- |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/. |
|
Details | Url | 1 | https://www.sentinelone.com/blog/ransomware-evolution-how-cheated-affiliates-are-recycling-victim-data-for-profit/. |
|
Details | Url | 1 | https://www.wiley.law/alert- |
|
Details | Url | 1 | https://www.bitdefender.com/blog/hotforsecurity/french- |
|
Details | Url | 2 | https://www.europol.europa.eu/media- |
|
Details | Url | 1 | https://www.europol.europa.eu/media-press/newsroom/news/largest- |
|
Details | Url | 1 | https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2023/. |
|
Details | Url | 1 | https://www.bitdefender.com/blog/labs/ai-meets-next-gen-info-stealers-in-social-media-malvertising-campaigns/. |
|
Details | Url | 1 | https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta547-targets-german-organizations-rhadamanthys-stealer. |
|
Details | Url | 1 | https://edition.cnn.com/2024/05/16/tech/arup-deepfake-scam-loss-hong-kong-intl-hnk/index.html |
|
Details | Url | 1 | https://www.group |
|
Details | Url | 1 | https://www.mandiant.com/resources/blog/initial-access-brokers-exploit-f5-screenconnect. |
|
Details | Url | 1 | https://underthebreach.medium.com/initial-access- |
|
Details | Url | 1 | https://www.cybereason.com/blog/unboxing-snake-python-infostealer-lurking-through-messaging-service. |
|
Details | Url | 1 | https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/. |
|
Details | Url | 1 | https://www.sentinelone.com/blog/12-months-of-fighting-cybercrime- |
|
Details | Url | 1 | https://www.sentinelone.com/blog/macos- |
|
Details | Url | 1 | https://blog.talosintelligence.com/need-to-know- |
|
Details | Url | 1 | https://www.proofpoint.com/us/blog/email-and-cloud-threats/tycoon-2fa-phishing-kit-mfa-bypass. |
|
Details | Url | 1 | https://blog.lastpass.com/posts/2024/04/advanced-phishing-kit-adds-lastpass-branding-for-use-in-phishing-campaigns. |
|
Details | Url | 1 | https://www.sentinelone.com/blog/the-rise-of-drainer-as-a-service-understanding-daas/. |
|
Details | Url | 1 | https://www.acice-asean.org/files/information%20centre%20reports/feb_24_info.pdf |
|
Details | Url | 1 | https://journals.sagepub.com/doi/10.1177/20563051231224723. |
|
Details | Url | 1 | https://www.sentinelone.com/blog/kryptina-raas- |
|
Details | Url | 1 | https://transparency.meta.com/en-gb/metasecurity/threat-reporting. |
|
Details | Url | 1 | https://github.com/blackorbird/apt_report/blob/master/summary/2024/atlantic-council-american-university-markets- |
|
Details | Url | 1 | https://www.euractiv.com/section/digital/opinion/governments-spying-on-citizens-who-is-to-blame-what-can-the-eu-do/. |
|
Details | Url | 1 | https://securitylab.amnesty.org/latest/2024/05/a-web-of-surveillance/. |
|
Details | Url | 1 | https://edri.org/our-work/press-release-brussels- |
|
Details | Url | 1 | https://home.treasury.gov/news/press-releases/jy2155. |
|
Details | Url | 1 | https://www.state.gov/announcement-of-a-visa-restriction-policy-to-promote-accountability-for-the-misuse-of- |
|
Details | Url | 1 | https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target. |
|
Details | Url | 1 | https://www.politico.eu/article/israel-hamas-war-hackers-cyberattacks/. |
|
Details | Url | 1 | https://time.com/6322175/israel-hamas-cyberattacks-hackers/. |
|
Details | Url | 3 | https://services.google.com/fh/files/misc/tool-of-first-resort-israel-hamas-war-cyber.pdf |
|
Details | Url | 1 | https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a. |
|
Details | Url | 1 | https://www.sentinelone.com/labs/the-israel-hamas-war-cyber-domain-state-sponsored-activity-of-interest/. |
|
Details | Url | 2 | https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf |
|
Details | Url | 1 | https://thehackernews.com/2024/02/a-new-age-of-hacktivism.html |
|
Details | Url | 1 | https://www.sentinelone.com/blog/oct-2023-cybercrime-update- |
|
Details | Url | 1 | https://www.secalliance.com/blog/russia- |
|
Details | Url | 1 | https://blogs.blackberry.com/en/2023/11/bibi-wiper-used-in-the-israel-hamas-war-now-runs-on-windows. |
|
Details | Url | 1 | https://www.jpost.com/israel- |
|
Details | Url | 1 | https://www.sentinelone.com/blog/ikaruz-red-team-hacktivist-group-leverages-ransomware-for-attention-not-profit/. |
|
Details | Url | 2 | https://www.first.org/events/colloquia/cardiff2023/program#ptime |
|
Details | Url | 8 | https://cve.mitre.org |
|
Details | Url | 2 | https://www.first.org/cvss/. |
|
Details | Url | 2 | https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator. |
|
Details | Url | 2 | https://cve.mitre.org/cve/cna.html |
|
Details | Url | 1 | https://cwe.mitre.org/. |
|
Details | Url | 1 | https://www.cve.org/programorganization/cnas. |
|
Details | Url | 1 | https://www.cisa.gov/known-exploited-vulnerabilities. |
|
Details | Url | 2 | https://cwe.mitre.org/top25/index.html |
|
Details | Url | 1 | https://www.cisa.gov/resources-tools/resources/secure-by-design-and-default. |
|
Details | Url | 2 | https://csrc.nist.gov/csrc/media/publications/nistir/draft/documents/nist.ir.8374-preliminary-draft.pdf |
|
Details | Url | 2 | https://www.guidepointsecurity.com/wp-content/uploads/2023/04/grit_ransomware_report_q1_2023.pdf |
|
Details | Url | 1 | https://www.reliaquest.com/blog/ransomware-q2-2023-victim-count-hits-new-heights/. |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023. |
|
Details | Url | 1 | https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-disrupt-worlds-biggest-ransomware- |
|
Details | Url | 1 | https://therecord.media/lockbitsupp-suspect-accused-lockbit-ransomware-gang. |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/24/d/operation-cronos-aftermath.html |
|
Details | Url | 1 | https://www.sophos.com/en-us/press/press-releases/2024/04/ransomware-payments-increase-500-last-year-finds- |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/ransomware-payments-drop-to-record-low-of-28-percent-in-q1-2024/. |
|
Details | Url | 1 | https://www.helpnetsecurity.com/2024/04/19/ransomware-q1-2024-payments/. |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/dark-angels-ransomware-receives-record-breaking-75-million-ransom/. |
|
Details | Url | 1 | https://www.zscaler.com/resources/industry-reports/threatlabz-ransomware-report.pdf |
|
Details | Url | 1 | https://thehackernews.com/2024/04/ransomware-double-dip-re-victimization.html |
|
Details | Url | 1 | https://www.bankinfosecurity.com/blogs/ransomware-groups-data-leak-blogs-lie-stop-trusting-them-p-3583. |
|
Details | Url | 1 | https://quointelligence.eu/2024/06/analyzing-shift-in-ransomware-dynamics/. |
|
Details | Url | 1 | https://twitter.com/uca_ruhate_/status/1714503030849032476. |
|
Details | Url | 1 | https://www.europol.europa.eu/media-press/newsroom/news/ragnar-locker-ransomware-gang-taken-down-international- |
|
Details | Url | 1 | https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant. |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/ransomware-gang-files-sec-complaint-over-victims-undisclosed- |
|
Details | Url | 1 | https://www.reliaquest.com/blog/q2-2024-ransomware/. |
|
Details | Url | 2 | https://csrc.nist.gov/glossary/term/malware. |
|
Details | Url | 2 | https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-171r2.pdf |
|
Details | Url | 2 | https://attack.mitre.org/techniques/t1587/001/. |
|
Details | Url | 1 | https://socradar.io/top-10-stealer-logs/. |
|
Details | Url | 1 | https://gridinsoft.com/blogs/infostealer-malware-top/. |
|
Details | Url | 1 | https://www.mcafee.com/blogs/other-blogs/mcafee-labs/redline-stealer-a-novel-approach |
|
Details | Url | 1 | https://cybelangel.com/how-have-infostealers-evolved-in-2024/. |
|
Details | Url | 2 | https://attack.mitre.org/software/s0331/. |
|
Details | Url | 1 | https://any.run/malware-trends/formbook |
|
Details | Url | 1 | https://any.run/malware-trends/lumma |
|
Details | Url | 1 | https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers- |
|
Details | Url | 1 | https://www.welivesecurity.com/en/eset-research/evasive-panda-leverages-monlam-festival-target-tibetans |
|
Details | Url | 1 | https://inquest.net/blog/top-malware-delivery-tactics-watch-out-2023/. |
|
Details | Url | 1 | https://www.akamai.com/blog/security-research/2024-redtail-cryptominer-pan-os-cve-exploit. |
|
Details | Url | 1 | https://www.fortinet.com/blog/threat-research/scrubcrypt-deploys-venomrat-with-arsenal-of-plugins. |
|
Details | Url | 2 | https://blog.phylum.io/persistent-npm-campaign-shipping-trojanized-jquery |
|
Details | Url | 1 | https://www.helpnetsecurity.com/2024/01/03/banking-trojans-mobile-devices/. |
|
Details | Url | 1 | https://www.welivesecurity.com/en/eset-research/eset-threat-report-h1-2024/. |
|
Details | Url | 1 | https://www.threatfabric.com/blogs/brokewell-do-not-go-broke-by-new-banking-malware. |
|
Details | Url | 1 | https://securityintelligence.com/x-force/grandoreiro-banking-trojan-unleashed/. |
|
Details | Url | 1 | https://flare.io/learn/resources/blog/malware-as-a-service/. |
|
Details | Url | 1 | https://darktrace.com/blog/the-rise-of-the-lumma-info-stealer. |
|
Details | Url | 1 | https://www.trellix.com/blogs/research/the-continued-evolution-of-the-darkgate-malware-as-a-service/. |
|
Details | Url | 1 | https://www.securityweek.com/trickbot-and-other-malware-droppers-disrupted-by-law-enforcement/. |
|
Details | Url | 1 | https://www.europol.europa.eu/media-press/newsroom/news/largest-ever-operation-against-botnets-hits-dropper- |
|
Details | Url | 1 | https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical. |
|
Details | Url | 1 | https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-242a. |
|
Details | Url | 2 | https://twitter.com/msftsecintel/status/1735856754427047985 |
|
Details | Url | 1 | https://www.enisa.europa.eu/topics/incident-response/glossary/what-is-social-engineering. |
|
Details | Url | 1 | https://www.bsi.bund.de/en/themen/verbraucherinnen-und-verbraucher/cyber-sicherheitslage/methoden-der-cyber- |
|
Details | Url | 1 | https://www.consilium.europa.eu/en/policies/cybersecurity/cybersecurity-social-engineering/. |
|
Details | Url | 1 | https://bics.com/press-releases/bics-blocks-87-million-euros-worth-of-fraud-attacks/. |
|
Details | Url | 5 | https://www.ic3.gov/media/pdf/annualreport/2022_ic3report.pdf |
|
Details | Url | 1 | https://www.cisa.gov/news-events/alerts/2024/06/12/phone-scammers-impersonating-cisa-employees. |
|
Details | Url | 1 | https://www.ftc.gov/news-events/news/press-releases/2024/03/federal-trade-commission-warns-scammers-pretending- |
|
Details | Url | 1 | https://www.europol.europa.eu/report-a-crime/report-cybercrime-online. |
|
Details | Url | 1 | https://murciatoday.com/video-fbi-take-down-uk-hacker-in-spain-for-stealing-27m-usd-of-bitcoins_1000077536-a.html |
|
Details | Url | 1 | https://www.cisa.gov/sites/default/files/2023-11/aa23-320a_scattered_spider_0.pdf |
|
Details | Url | 1 | https://www.scmagazine.com/news/north-koreas-moonstone-sleet-targets-victims-with-malicious-tools. |
|
Details | Url | 1 | https://www.darkreading.com/threat-intelligence/dprk-hackers-masquerade-as-tech-recruiters-job-seekers. |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/fake-job-interviews-target-developers-with-new-python-backdoor/. |
|
Details | Url | 1 | https://www.darkreading.com/cyberattacks-data-breaches/warmcookie-cyberattackers-backdoor-initial-access. |
|
Details | Url | 1 | https://twitter.com/parth220_/status/1771589789143478471. |
|
Details | Url | 1 | https://blog.talosintelligence.com/how-are-attackers-trying-to-bypass-mfa/. |
|
Details | Url | 2 | https://unit42.paloaltonetworks.com/luna-moth-callback-phishing/. |
|
Details | Url | 1 | https://www.ic3.gov/media/news/2023/231108.pdf |
|
Details | Url | 1 | https://www.hhs.gov/sites/default/files/baza-r-call-campaigns-analyst-note.pdf |
|
Details | Url | 1 | https://www.domo.com/learn/infographic/data-never-sleeps-11. |
|
Details | Url | 2 | https://blog.f-secure.com/data-breach-and-data-leak-whats-the-difference/. |
|
Details | Url | 1 | https://ieeexplore.ieee.org/document/10175648. |
|
Details | Url | 1 | https://techcrunch.com/2023/08/25/moveit-mass-hack-by-the-numbers/. |
|
Details | Url | 2 | https://surfshark.com/research/data-breach-monitoring. |
|
Details | Url | 2 | https://media.cert.europa.eu/static/memo/2021/tlp-white-cert-eu-threat_landscape_report-volume1.pdf#page=13&zoom=auto |
|
Details | Url | 1 | https://www.tenable.com/blog/cybersecurity-snapshot-a-look-back-at-key-2023-cyber-data-for-genai-cloud-security. |
|
Details | Url | 1 | https://cloudsecurityalliance.org/press-releases/2023/06/05/new-cloud-security-alliance-survey-finds-saas-security-has- |
|
Details | Url | 1 | https://blog.barracuda.com/2024/04/03/generative-ai-data-poisoning-manipulation. |
|
Details | Url | 1 | https://fedtechmagazine.com/article/2024/01/unpacking-ai-data-poisoning. |
|
Details | Url | 1 | https://www.cobalt.io/blog/data-poisoning-attacks-a-new-attack-vector-within-ai. |
|
Details | Url | 1 | https://www.forbes.com/sites/bernardmarr/2024/02/05/five-generative-ai-chatbots-everyone-should-know-about/. |
|
Details | Url | 1 | https://www.wired.com/story/generative-ai-prompt-injection-hacking/. |
|
Details | Url | 1 | https://siliconangle.com/2024/05/21/immersive-labs-warns-generative-ai-bots-highly-vulnerable-prompt-injection- |
|
Details | Url | 2 | https://www.consilium.europa.eu/en/press/press-releases/2023/05/20/g7-hiroshima-leaders-communique/. |
|
Details | Url | 2 | https://digital-strategy.ec.europa.eu/en/policies/european-approach-artificial-intelligence. |
|
Details | Url | 1 | https://carnegieendowment.org/research/2024/02/tracing-the-roots-of-chinas-ai-regulations?lang=en |
|
Details | Url | 2 | https://www.whitehouse.gov/ostp/ai-bill-of-rights/. |
|
Details | Url | 1 | https://www.immersivelabs.com/dark-side-of-genai-report/. |
|
Details | Url | 1 | https://www.insurancebusinessmag.com/uk/news/technology/how-generative-ai-is-reshaping-conversations-around- |
|
Details | Url | 1 | https://cybermagazine.com/articles/sensitive-data-like-passwords-and-pii-shared-to-ai-chatbots. |
|
Details | Url | 1 | https://www.datacenterdynamics.com/en/news/amazons-q-generative-ai-chatbot-leaks-location-of-aws-data-centers/. |
|
Details | Url | 1 | https://www.spiceworks.com/tech/artificial-intelligence/news/chatgpt-leaks-sensitive-user-data-openai-suspects-hack/. |
|
Details | Url | 1 | https://cybernews.com/security/chatgpt-samsung-leak-explained-lessons/#google_vignette |
|
Details | Url | 1 | https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat. |
|
Details | Url | 1 | https://www.forbes.com/sites/forbestechcouncil/2023/10/16/generative-ai-is-the-next-tactical-cyber-weapon-for-threat- |
|
Details | Url | 1 | https://www.infosecurity-magazine.com/news/french-employment-agency-data/. |
|
Details | Url | 2 | https://www.akamai.com/resources/research-paper/the-evolution-of-ddos-return-of-the-hacktivists. |
|
Details | Url | 1 | https://stormwall.network/ddos-report-stormwall-q4-2023. |
|
Details | Url | 1 | https://www.akamai.com/blog/security/a-retrospective-on-ddos-trends-in-2023. |
|
Details | Url | 1 | https://blog.cloudflare.com/ddos-threat-report-2023-q4. |
|
Details | Url | 1 | https://blog.cloudflare.com/cyber-attacks-in-the-israel-hamas-war/. |
|
Details | Url | 1 | https://www.netscout.com/threatreport/. |
|
Details | Url | 1 | https://www.imperva.com/resources/resource-library/reports/2024-imperva-ddos-threat-landscape-report |
|
Details | Url | 1 | https://stormwall.network/ddos-attack-report-2023. |
|
Details | Url | 1 | https://www.netscout.com/threatreport/wp-content/uploads/2024/04/threat_report_2h2023.pdf |
|
Details | Url | 1 | https://www.netscout.com/threatreport/ddos- |
|
Details | Url | 1 | https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps. |
|
Details | Url | 1 | https://blog.cloudflare.com/ddos-threat-report-2023-q3. |
|
Details | Url | 1 | https://blog.cloudflare.com/ddos-threat-report-for-2024-q1. |
|
Details | Url | 1 | https://ddos-guard.net/info/protect?id=51722 |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/fbi-seized-domains-linked-to-48-ddos-for-hire-service- |
|
Details | Url | 2 | https://www.microsoft.com/en-us/security/blog/2023/02/21/2022-in-review-ddos-attack-trends-and-insights/. |
|
Details | Url | 1 | https://www.europol.europa.eu/cms/sites/default/files/documents/iocta%202023%20-%20en_0.pdf |
|
Details | Url | 1 | https://www.port.ac.uk/news-events-and-blogs/blogs/us-sanctions-on-iranian-hackers-highlight-growing-concern-about- |
|
Details | Url | 1 | https://www.akamai.com/lp/soti/high-stakes-of-innovation. |
|
Details | Url | 1 | https://blog.cloudflare.com/q1-2024-internet-disruption-summary. |
|
Details | Url | 1 | https://www.accessnow.org/wp-content/uploads/2024/05/2023-kio-report.pdf |
|
Details | Url | 2 | https://www.accessnow.org/campaign/keepiton/. |
|
Details | Url | 1 | https://slovenia.mfa.gov.ua/en/news/russian-group-cyber-army-russia-reborn-announced-cyber-attacks-critical- |
|
Details | Url | 1 | https://www.state.gov/sanctioning-members-of-the-cyber-army-of-russia-reborn |
|
Details | Url | 2 | https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm |
|
Details | Url | 2 | https://www.imperva.com/blog/lift-the-ddos-smokescreen-investigate-underlying-attacks/. |
|
Details | Url | 1 | https://www.fsisac.com/hubfs/knowledge/ddos/fsisac_ddos-heretostay.pdf |
|
Details | Url | 2 | https://www.cloudbric.com/blog/2020/11/ddos-rdos-extortion- |
|
Details | Url | 2 | https://www.networkcomputing.com/network-security/ransom-ddos-phenomenon-pay-or-get-knocked-offline. |
|
Details | Url | 3 | https://www.cdn.neustar/resources/whitepapers/security/neustar-cyber-threats-trends-2020-report.pdf |
|
Details | Url | 2 | https://www3.weforum.org/docs/wef_the_global_risks_report_2022.pdf |
|
Details | Url | 1 | https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398- |
|
Details | Url | 1 | https://www.helpnetsecurity.com/2023/06/19/microsoft-365-azure-ddos/. |
|
Details | Url | 1 | https://www.nexusguard.com/file/nexusguard-ddos-trend-report-2024. |
|
Details | Url | 1 | https://vercara.com/resources/2023-ddos-statistics-and-trends. |
|
Details | Url | 1 | https://blog.qrator.net/en/2023-ddos-attacks-statistics-and- |
|
Details | Url | 2 | https://www.infosecurity-magazine.com/blogs/2022-ddos-yearinreview/. |
|
Details | Url | 1 | https://azure.microsoft.com/es-es/blog/unwrapping-the-2023-holiday-season-a-deep-dive-into-azures-ddos-attack-landscape/. |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/ddos-attacks-target-eu-political-parties-as-elections-begin/. |
|
Details | Url | 1 | https://blog.cloudflare.com/exploring-the-2024-eu-election-internet-traffic-trends-and-cybersecurity-insights. |
|
Details | Url | 1 | https://www.akamai.com/newsroom/press-release/akamai-report-finds-ddos-attacks-against-financial-services-gambling- |
|
Details | Url | 1 | https://www.nexusguard.com/press/87-of-ddos-attacks-targeted-windows-os-devices-in-2023. |
|
Details | Url | 1 | https://www.akamai.com/blog/security/akamai-prevents-the-largest-ddos-attack-on-a-us-financial-company. |
|
Details | Url | 2 | https://www.eeas.europa.eu/eeas/tackling-disinformation-foreign-information-manipulation-interference_en. |
|
Details | Url | 2 | https://www.disarm.foundation/framework. |
|
Details | Url | 1 | https://medium.com/disarming-disinformation/disarm-v1-5-personas-update-bf0323614e3b |
|
Details | Url | 1 | https://www.enisa.europa.eu/publications/foreign-information-manipulation-interference-fimi-and-cybersecurity-threat- |
|
Details | Url | 12 | https://attack.mitre.org/. |
|
Details | Url | 1 | https://raport.valisluureamet.ee/2023/en/russian-armed-forces/1-3-russia-continues-to-look-for-a-weak-link-in-ukrainian- |
|
Details | Url | 2 | https://www.microsoft.com/en-us/security/security- |
|
Details | Url | 1 | https://www.theguardian.com/world/2024/feb/23/2024-global-elections-tracker-voting-dates-us-india-indonesia-belarus- |
|
Details | Url | 1 | https://www.eeas.europa.eu/eeas/2nd-eeas-report-foreign-information-manipulation-and-interference-threats_en. |
|
Details | Url | 1 | https://digital-strategy.ec.europa.eu/en/news/new-cybersecurity-compendium-how-protect-integrity-elections-published. |
|
Details | Url | 1 | https://www.europarl.europa.eu/news/en/press-room/20230524ipr91908/foreign-interference-meps-call-for-urgent- |
|
Details | Url | 1 | https://edmo.eu/blog/eu-elections-2024-the-battle-against-disinformation-was-won-but-the-attrition-war-is-far-from-over/. |
|
Details | Url | 1 | https://www.radware.com/blog/security/2024/06/uncovering-the-hacktivist-cyberattacks-targeting-the-eu-election/. |
|
Details | Url | 1 | https://vsquare.org/behind-the-hack-and-leak-scandal-in-poland/. |
|
Details | Url | 1 | https://www.lemonde.fr/en/france/article/2024/03/01/bedbug-panic-was-stoked-by-russia-says-france_6575870_7.html |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/how-russia-is-trying-to-disrupt-the-2024- |
|
Details | Url | 1 | https://www.sgdsn.gouv.fr/files/files/20240611_np_sgdsn_viginum_matriochka_en_vf.pdf |
|
Details | Url | 1 | https://www.nature.com/articles/s41598-024-60653-y |
|
Details | Url | 1 | https://www.atlanticcouncil.org/in-depth-research-reports/report/undermining- |
|
Details | Url | 1 | https://www.state.gov/wp-content/uploads/2023/10/how-the-peoples- |
|
Details | Url | 1 | https://www.state.gov/wp-content/uploads/2023/10/how-the-peoples-republic-of-china-seeks-to- |
|
Details | Url | 1 | https://www.microsoft.com/en-us/security/security-insider/microsoft-digital- |
|
Details | Url | 1 | https://www.theguardian.com/technology/article/2024/may/18/how-china-is-using-ai-news-anchors-to-deliver-its- |
|
Details | Url | 2 | https://openai.com/index/disrupting-deceptive-uses-of-ai-by-covert-influence-operations |
|
Details | Url | 1 | https://finance.ec.europa.eu/eu-and- |
|
Details | Url | 3 | https://blog.sekoia.io/master-of-puppets-uncovering-the-doppelganger-pro-russian-influence-campaign |
|
Details | Url | 1 | https://euvsdisinfo.eu/something-dark-hiding-behind-the-ads/. |
|
Details | Url | 1 | https://www.ivir.nl/publicaties/download/abc_framework_2019_sept_2019.pdf |
|
Details | Url | 2 | https://cdn.openai.com/papers/forecasting-misuse.pdf |
|
Details | Url | 1 | https://www.wired.com/story/openai-threat-report-china-russia-ai-propaganda/. |
|
Details | Url | 1 | https://www.newsguardtech.com/special-reports/ai-tracking-center/. |
|
Details | Url | 1 | https://openai.com/index/disrupting-deceptive-uses-of-ai-by-covert- |
|
Details | Url | 1 | https://dfrlab.org/2024/07/09/ai-tools-usage-for-disinformation-in-the-war-in-ukraine |
|
Details | Url | 2 | https://healthcyber.mitre.org/blog/resources/attack-navigator |
|
Details | Url | 2 | https://attack.mitre.org/techniques/t1587/001 |
|
Details | Url | 57 | https://attack.mitre.org |
|
Details | Url | 2 | https://sot.mitre.org |
|
Details | Url | 3 | https://www.iso.org/standard/27001 |
|
Details | Url | 14 | https://www.nist.gov/cyberframework |
|
Details | Url | 2 | https://github.com/circl/ail-framework |
|
Details | Url | 2 | https://artificialintelligenceact.eu |
|
Details | Url | 2 | https://www.wsav.com/wp-content/uploads/sites/75/2022/01/20220124_itrc-2021-data-breach-report.pdf |
|
Details | Url | 2 | https://blog.f-secure.com/data-breach-and-data-leak-whats-the-difference |
|
Details | Url | 2 | https://www.verizon.com/business/resources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf |
|
Details | Url | 2 | https://www.netscout.com/blog/asert/ddos-attack-campaign-targeting-multiple-organizations-ukraine |
|
Details | Url | 2 | https://www.f5.com/labs/articles/threat-intelligence/2022-application-protection-report-ddos-attack-trends |
|
Details | Url | 2 | https://hacked.com/will-2022-be-the-year-of-the-ddos-attack |
|
Details | Url | 2 | https://www.f5.com/labs/articles/threat-intelligence/ddos-attack-trends-for-2020 |
|
Details | Url | 2 | https://www.aha.org/system/files/media/file/2021/03/distributed-denial-of- |
|
Details | Url | 2 | https://www.eeas.europa.eu/sites/default/files/documents/2023/eeas-datateam-threatreport-2023..pdf |
|
Details | Url | 2 | https://stixproject.github.io |
|
Details | Url | 1 | https://carnegieendowment.org/research/2023/03/phase-based-tactical-analysis-of-online-operations?lang=en |
|
Details | Url | 2 | https://www.ofcom.org.uk/news-centre/2022/one-in-three-internet-users-fail-to-question-misinformation |
|
Details | Url | 2 | https://www.apa.org/monitor/2022/06/news-misinformation-attack |
|
Details | Url | 2 | https://www.first.org/standards/frameworks/psirts/psirt_services_framework_v1.1 |
|
Details | Url | 2 | https://www.first.org/global/sigs/vulnerability-coordination/multiparty/guidelines-v1.1 |
|
Details | Url | 2 | https://github.blog/2022-03-28-how-to-secure-your-end-to-end-supply-chain-on-github |