UNKNOWN
Common Information
Type | Value |
---|---|
UUID | 59a5701a-8282-46d2-8329-e323813bb5c3 |
Fingerprint | a0f1d8d3fdc63a856fc99a24b92b470ba1788fe09229dee83f5eee7cc4ac0093 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Jan. 22, 2019, 4:16 p.m. |
Added to db | April 14, 2024, 10:35 a.m. |
Last updated | Aug. 30, 2024, 10:47 p.m. |
Headline | UNKNOWN |
Title | UNKNOWN |
Detected Hints/Tags/Attributes | 104/3/73 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://documents.trendmicro.com/assets/rpt/rpt-mapping-the-future-IT.pdf |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 14 | gs.statcounter.com |
|
Details | Domain | 3 | www.today.com |
|
Details | Domain | 2 | news.gallup.com |
|
Details | Domain | 2 | www.polycom.com |
|
Details | Domain | 20 | www.idc.com |
|
Details | Domain | 177 | blog.trendmicro.com |
|
Details | Domain | 133 | www.infosecurity-magazine.com |
|
Details | Domain | 30 | fortune.com |
|
Details | Domain | 175 | www.zdnet.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 18 | www.telegraph.co.uk |
|
Details | Domain | 177 | www.wired.com |
|
Details | Domain | 360 | attack.mitre.org |
|
Details | Domain | 34 | www.enisa.europa.eu |
|
Details | Domain | 62 | www.zerodayinitiative.com |
|
Details | Domain | 28 | forbes.com |
|
Details | Domain | 29 | www.cvedetails.com |
|
Details | Domain | 202 | krebsonsecurity.com |
|
Details | Domain | 247 | www.virusbulletin.com |
|
Details | Domain | 37 | www.cnbc.com |
|
Details | Domain | 8 | www.marketwatch.com |
|
Details | File | 2 | the-cost-of-credential-stuffing-asia-pacific.pdf |
|
Details | File | 2 | advice-a8337016.html |
|
Details | File | 2 | report_gen_1216_web_final_rj.pdf |
|
Details | File | 2 | changing-needs-of-the-workplace-whitepaper-enus.pdf |
|
Details | File | 10 | getdoc.jsp |
|
Details | File | 384 | www.inf |
|
Details | File | 2 | kubernetes-kubernetes.html |
|
Details | File | 2 | google-nest-senior-living-aging.html |
|
Details | File | 252 | www.cs |
|
Details | File | 2 | research-suggests-cybersecurity-skills-shortage-is-getting-worse.html |
|
Details | Url | 2 | http://gs.statcounter.com/os-market-share/all/worldwide/2013. |
|
Details | Url | 3 | http://gs.statcounter.com/os-market-share. |
|
Details | Url | 1 | https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin. |
|
Details | Url | 1 | https://www.akamai.com/us/en/multimedia/documents/white-paper/the-cost-of-credential-stuffing-asia-pacific.pdf |
|
Details | Url | 1 | https://www.today.com/parents/how-online-sextortion-drove-one-young-man-suicide-t122735 |
|
Details | Url | 2 | https://www.independent.co.uk/news/uk/crime/blackmail-online-sextortion-suicides-videos-photos-sexual-police- |
|
Details | Url | 2 | https://www.greenocktelegraph.co.uk/news/17204102.inverclyde |
|
Details | Url | 2 | https://news.gallup.com/file/reports/199961/soaw_ |
|
Details | Url | 2 | http://www.polycom.com/content/dam/polycom |
|
Details | Url | 2 | https://www.idc.com/getdoc.jsp?containerid=prus44361618 |
|
Details | Url | 2 | https://blog.trendmicro.com/trendlabs-security-intelligence/iot-devices-need-better-builtin-security/. |
|
Details | Url | 2 | https://blog.trendmicro.com/what-hipaa-and-other-compliance-teaches-us-about-the-reality-of-gdpr/. |
|
Details | Url | 2 | https://www.infosecurity-magazine.com/news/ico-swamped-with-gdpr-breach/. |
|
Details | Url | 2 | http://fortune.com/2018/12/04/targeted-email-fraud/. |
|
Details | Url | 2 | https://www.zdnet.com/article/automation-will-become-central-to-business-strategy-and-operations/. |
|
Details | Url | 2 | https://blog.trendmicro.com/trendlabs-security-intelligence/digital-extortion-forward-looking-view/. |
|
Details | Url | 2 | https://carnegieeurope.eu/2018/06/27/europe-up-for-grabs-looming-battle-lines-of-2019-european-parliament- |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fake-news- |
|
Details | Url | 2 | https://www.telegraph.co.uk/news/2018/09/20/government-draws-plans-social-media-regulator-following- |
|
Details | Url | 2 | https://arstechnica.com/information-technology/2016/11/adobe-voco-photoshop-for-audio-speech-editing/. |
|
Details | Url | 2 | https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/. |
|
Details | Url | 3 | https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/. |
|
Details | Url | 2 | https://www.theverge.com/2018/9/28/17874768/california-iot-smart-device-cybersecurity-bill-sb-327-signed-law. |
|
Details | Url | 2 | https://blog.trendmicro.com/trendlabs-security-intelligence/understanding-code-signing- |
|
Details | Url | 2 | https://attack.mitre.org/tactics/ta0002/. |
|
Details | Url | 2 | https://www.enisa.europa.eu/topics/nis-directive. |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/the-state-of-scada-hmi-vulnerabilities. |
|
Details | Url | 2 | https://www.zerodayinitiative.com/blog/2018/7/9/checking-in-a-look-back-at-the-first-half-of-2018. |
|
Details | Url | 2 | https://www.zdnet.com/article/cryptojacking-attacks-surge-against-enterprise-cloud-environments/. |
|
Details | Url | 2 | https://www.zdnet.com/article/what-is-docker-and-why-is-it-so-darn-popular/. |
|
Details | Url | 2 | https://www.forbes.com/sites/udinachmany/2018/11/01/kubernetes-evolution-of-an-it-revolution/#366fcb4554e1 |
|
Details | Url | 2 | https://www.cvedetails.com/vulnerability- |
|
Details | Url | 3 | https://www.zdnet.com/article/kubernetes-first-major-security-hole-discovered/. |
|
Details | Url | 2 | https://kromtech.com/blog/security-center/cryptojacking-invades-cloud-how-modern-containerization-trend-is- |
|
Details | Url | 2 | http://blog.trendmicro.com/threat-morphosis/. |
|
Details | Url | 5 | https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/. |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/linux-security-a-closer-look-at-the-latest-linux-threats. |
|
Details | Url | 109 | https://www.virusbulletin.com |
|
Details | Url | 2 | https://www.cnbc.com/2018/07/20/google-nest-senior-living-aging.html |
|
Details | Url | 2 | https://www.marketwatch.com/story/these-common-scams-target-the-elderlyhow-to-avoid-them-2018-11-15. |
|
Details | Url | 2 | https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/threats-to-voice-based-iot-and-iiot-devices. |
|
Details | Url | 2 | https://www.csoonline.com/article/3247708/security/research-suggests-cybersecurity-skills-shortage-is-getting-worse.html |