UNKNOWN
Tags
Common Information
Type Value
UUID 200e6fc8-c0c0-4059-a7cb-1791e31685d2
Fingerprint d77fd7e76ddd5f75
Analysis status DONE
Considered CTI value 0
Text language
Published None
Added to db Aug. 31, 2024, 12:24 a.m.
Last updated Dec. 21, 2024, 3:56 p.m.
Headline UNKNOWN
Title UNKNOWN
Detected Hints/Tags/Attributes 1/0/0
Source URLs
Redirection Url
Details Source https://l.avala.mp/?p=241
Details Source https://www.sonarsource.com/blog/
Details Source https://linuxsecurity.com/advisories/fedora/fedora-37-clamav-2023-d686b8d48f-29zvppjmgdk9
Details Source https://lukasstefanko.com/2019/02/android-clipper-found-on-google-play.html
Details Source https://medium.com/@TataTelBusinessServices/importance-of-cybersecurity-fb6b01748e0d?source=rss------cybersecurity-5
Details Source https://arcticwolf.com/resources/upcoming-events-and-webinars-de/it-sicherheitstag-2023/
Details Source https://arcticwolf.com/resources/upcoming-events-and-webinars/the-total-economic-impact-of-arctic-wolf/
Details Source https://mega.nz/file/lkh1gY5C#93FUlwTwl0y27cfM0jtm4SYnWbtk06d0qoDg1e4eQ6s
Details Source https://cert.gov.ua/article/18101
Details Source https://news.hitb.org/content/blackcat-operators-distributing-ransomware-disguised-winscp-malvertising
Details Source https://news.hitb.org/content/bug-apple-macos-ventura-breaks-third-party-security-tools
Details Source https://cert.gov.ua/article/703548
Details Source https://news.hitb.org/content/carderbee-hacking-group-targets-organizations-asia
Details Source https://news.hitb.org/content/cyberespionage-group-developed-backdoors-tailored-vmware-esxi-hypervisors
Details Source https://news.hitb.org/content/european-parliament-pegasus-investigation-faces-resistance
Details Source https://news.hitb.org/content/fbi-dont-use-public-phone-charging-stations
Details Source https://news.hitb.org/content/fbi-finally-tracks-swatting-incidents-attacks-increase-nationwide
Details Source https://news.hitb.org/content/gpt-3-and-cybersecurity
Details Source https://news.hitb.org/content/hackers-exploit-gaping-windows-loophole-give-their-malware-kernel-access
Details Source https://news.hitb.org/content/middle-east-telcos-targeted-new-malware-suspected-nation-state-backing
Details Source https://news.hitb.org/content/new-supply-chain-attack-hit-close-100-victims-and-clues-point-china
Details Source https://news.hitb.org/content/stealthy-uefi-malware-bypassing-secure-boot-enabled-unpatchable-windows-flaw
Details Source https://news.hitb.org/content/threat-actor-targeted-dod-contracting-website
Details Source https://prevasio.com/static/web/viewer.html?file=/static/Red_Kangaroo.pdf
Details Source https://s3.eurecom.fr/tools/screaming_channels/
Details Source https://www.enterprisetech.com/2019/03/08/ai-fear-factor-white-collar-jobs-in-crosshairs-cash-free-retail-banned-breaking-up-the-faangs/
Details Source https://www.exploit-db.com/exploits/51376
Details Source https://www.fox-it.com/en/insights/blogs/blog/your-trust-our-signature/
Details Source https://www.guidepointsecurity.com/blog/a-ransomware-near-miss-proxyshell-a-rat-and-cobalt-strike/
Details Source https://www.guidepointsecurity.com/mount-locker-ransomware-steps-up-counter-ir-capabilities/
Details Source https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/
Details Source https://www.idf.il/en/minisites/hamas/hamas-uses-fake-facebook-profiles-to-target-israeli-soldiers/
Details Source https://www.ledecodeur.ch/2023/05/24/des-millions-de-telephones-mobiles-preinfectes-par-des-logiciels-malveillants/
Details Source https://www.linkedin.com/in/graysonchristopher/
Details Source https://www.nccgroup.com/uk/about-us/newsroom-and-events/blogs/2018/december/owning-the-virgin-media-hub-3.0-the-perfect-place-for-a-backdoor/
Details Source https://www.nccgroup.com/uk/about-us/newsroom-and-events/blogs/2018/march/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/?Year=2018&Month=3
Details Source https://www.nccgroup.com/uk/our-research/technical-advisory-bypassing-workflows-protection-mechanisms-remote-code-execution-on-sharepoint/
Details Source https://www.nccgroup.com/us/about-us/newsroom-and-events/blog/2017/february/Multiple_Vulnerabilities_in_Accellion_File_Transfer_Appliance/
Details Source https://www.nccgroup.com/us/about-us/newsroom-and-events/blog/2018/december/eternalglue-part-three-releasing-a-worm-into-an-enterprise-network-of-a-100-billion-dollar-company/
Details Source https://securityintelligence.com/detecting-undetected-info-stealers/
Details Source https://securityintelligence.com/internet-explorer-ie-10-enhanced-protected-mode-epm-sandbox-research/
Details Source https://securityintelligence.com/new-banking-trojan-mnubot-discovered-by-ibm-x-force-research/
Details Source https://securityintelligence.com/posts/detecting-undetected-info-stealers/
Details Source https://securityintelligence.com/posts/itg10-targeting-south-korean-entities/
Details Source https://securityintelligence.com/posts/more_eggs-anyone-threat-actor-itg08-strikes-again/
Details Source https://securityintelligence.com/posts/new-ze-loader-targets-online-banking/
Details Source https://securityintelligence.com/posts/zeus-sphinx-trojan-awakens-amidst-coronavirus-spam-frenzy/
Details Source https://securityintelligence.com/qakbot-banking-trojan-causes-massive-active-directory-lockouts/
Details Source https://securityintelligence.com/zeus-maple-variant-targets-canadian-online-banking-customers/
Details Source https://www.advanced-intel.com/post/secret-backdoor-behind-conti-ransomware-operation-introducing-atera-agent
Details Source https://www.nccgroup.com/us/about-us/newsroom-and-events/blog/2019/october/bypassing-authentication-on-ssh-bastion-hosts/
Details Source https://www.nccgroup.com/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Details Source https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/sakula-an-adventure-in-dll-planting/?page=1
Details Source https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/analysing-a-recent-poison-ivy-sample/
Details Source https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/smuggling-hta-files-in-internet-exploreredge/
Details Source https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/september/eternalglue-part-one-rebuilding-notpetya-to-assess-real-world-resilience/
Details Source https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/april/decoding-network-data-from-a-gh0st-rat-variant
Details Source https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/april/decoding-network-data-from-a-gh0st-rat-variant/
Details Source https://www.bizjournals.com/albuquerque/news/2022/10/26/maintain-cybersecurity-of-your-business-remotely.html
Details Source https://www.bizjournals.com/bizjournals/news/2022/11/10/data-privacy-laws-business-owners-cpra.html
Details Source https://www.bizjournals.com/bizjournals/news/2023/05/19/linkedin-ransomware-phishing-cyber-attack.html
Details Source https://www.bizjournals.com/bizjournals/news/2023/08/14/cybersecurity-weak-link-tips-employees-breaches.html
Details Source https://www.bizjournals.com/buffalo/inno/stories/news/2022/10/14/cybersecurity-can-be-daunting-but-is-critical.html
Details Source https://www.bizjournals.com/buffalo/news/2022/10/14/cybersecurity-can-be-daunting-but-is-critical.html
Details Source https://www.bizjournals.com/dayton/news/2022/11/14/cyber-risk-among-younger-generations.html
Details Source https://www.bizjournals.com/kansascity/news/2022/08/22/stinson-cybersecurity-technology-budget-murdock.html
Details Source https://www.bizjournals.com/kansascity/news/2022/10/01/why-your-business-could-be-denied-cybersecurity.html
Details Source https://www.bizjournals.com/phoenix/news/2022/10/03/right-cybersecurity-approach-for-your-business.html
Details Source https://www.bizjournals.com/sanfrancisco/inno/stories/inno-insights/2023/04/06/ai-interview-ceo.html?ana=RSS&s=article_search
Details Source https://www.bizjournals.com/sanfrancisco/news/2022/11/18/viewpoint-mcnellis-time-for-office-to-go-retro.html?ana=RSS&s=article_search
Details Source http://www.ms509.com/2016/07/26/ghost-virus/
Details Source https://www.bizjournals.com/sanfrancisco/news/2022/10/07/sfbt-digest-friday-kgo-twitter-musk-facebook-hack.html?ana=RSS&s=article_search
Details Source https://www.bizjournals.com/sanfrancisco/news/2023/03/30/managing-mobile-devices-today-business-environment.html?ana=RSS&s=article_search
Details Source https://www.bizjournals.com/sanfrancisco/news/2023/07/19/protect-from-generative-ai-cybersecurity-threats.html?ana=RSS&s=article_search
Details Source https://www.bizjournals.com/twincities/news/2022/08/26/table-of-experts-cybersecurity.html
Details Source https://www.clearskysec.com/cedar/
Details Source https://www.clearskysec.com/cryptocore-lazarus-attribution/
Details Source https://www.clearskysec.com/evilnominatus-ransomware/
Details Source https://www.clearskysec.com/fata-morgana/
Details Source https://www.clearskysec.com/iranian-apt-black-box/
Details Source https://www.clearskysec.com/lyceum-suicide-drone/
Details Source https://www.clearskysec.com/muddywater-operations-in-lebanon-and-oman/
Details Source https://www.clearskysec.com/operation-dream-job/
Details Source https://www.clearskysec.com/the-kittens-are-back-in-town-2/
Details Source https://www.clearskysec.com/wp-content/uploads/2016/01/Operation
Details Source https://www.cobaltstrike.com/help-browser-pivoting
Details Source https://www.corelan.be/index.php/2010/01/26/starting-to-write-immunity-debugger-pycommands-my-cheatsheet/
Details Source https://www.corelan.be/index.php/2013/01/18/heap-layout-visualization-with-mona-py-and-windbg/
Details Source https://www.cyber.nj.gov/alerts-advisories/apt29-targets-microsoft-365-accounts/
Details Source https://www.cyber.nj.gov/alerts-advisories/apt5-citrix-adc-threat-hunting-guidance/
Details Source https://www.cyber.nj.gov/alerts-advisories/beware-of-scams-capitalizing-on-public-interest/
Details Source https://www.cyber.nj.gov/alerts-advisories/ducktail-phishing-campaign-targets-facebook-users-with-new-information-stealing-malware/
Details Source https://www.cyber.nj.gov/alerts-advisories/emotet-botnet-uses-one-click-attack-technique/
Details Source https://www.cyber.nj.gov/alerts-advisories/fargo-ransomware-targets-microsoft-sql-servers/
Details Source https://www.cyber.nj.gov/alerts-advisories/impacket-and-exfiltration-tool-used-to-steal-sensitive-information-from-defense-industrial-base-orga/
Details Source https://www.cyber.nj.gov/alerts-advisories/machine-learning-models-become-new-attack-vector-for-ransomware/
Details Source https://www.cyber.nj.gov/alerts-advisories/malware-downloader-guloader-utilizes-new-obfuscation-techniques-against-security-software/
Details Source https://www.cyber.nj.gov/alerts-advisories/microsoft-product-critical-patches-issued/
Details Source https://www.cyber.nj.gov/alerts-advisories/multiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution-december-14-2022/
Details Source https://www.cyber.nj.gov/alerts-advisories/new-azov-ransomware-data-wiper/
URL Provider
Details Provider Source level domain
Details 3xp0rt.xyz 3xp0rt.xyz
Details 401trg.pw 401trg.pw
Details adlumin.com adlumin.com
Details admin.ch www.govcert.admin.ch
Details advanced-intel.com www.advanced-intel.com
Details advancedpersistentjest.com advancedpersistentjest.com
Details andrewlang.net blog.andrewlang.net
Details anomali.com forum.anomali.com
Details arcticwolf.com arcticwolf.com
Details avala.mp l.avala.mp
Details bi.zone bi.zone
Details bin.re bin.re
Details binaryfirefly.com bluepurple.binaryfirefly.com
Details bittherapy.net bittherapy.net
Details bizjournals.com www.bizjournals.com
Details blackberry.com blogs.blackberry.com
Details blogspot.com sud0man.blogspot.com
Details blogspot.com spygate-rat.blogspot.com
Details blogspot.lu spygate-rat.blogspot.lu
Details brendangregg.com brendangregg.com
Details census-labs.com census-labs.com
Details cerbero-blog.com cerbero-blog.com
Details cert.gov.kz cert.gov.kz
Details cert.gov.ua cert.gov.ua
Details ch3rn0byl.com ch3rn0byl.com
Details checkpoint.com blog.checkpoint.com
Details chosun.com biz.chosun.com
Details cisco.com blogs.cisco.com
Details clearskysec.com www.clearskysec.com
Details cobaltstrike.com www.cobaltstrike.com
Details connect-trojan.net www.connect-trojan.net
Details consensys.io consensys.io
Details consensys.net consensys.net
Details consensys.net diligence.consensys.net
Details corelan.be www.corelan.be
Details cyberbit.com www.cyberbit.com
Details cyberstanc.com cyberstanc.com
Details cybersyndicates.com cybersyndicates.com
Details cyto.top cyto.top
Details dailydarkweb.net dailydarkweb.net
Details daleys.space daleys.space
Details daleys.space ww25.daleys.space
Details darthnull.org darthnull.org
Details digitasecurity.com digitasecurity.com
Details digitrustgroup.com www.digitrustgroup.com
Details enterpriseai.news www.enterpriseai.news
Details enterprisetech.com www.enterprisetech.com
Details eurecom.fr s3.eurecom.fr
Details exploit-db.com www.exploit-db.com
Details f5.com support.f5.com
Details facct.ru www.facct.ru
Details fixitgearware.com www.fixitgearware.com
Details forbes.com www.forbes.com
Details fox-it.com www.fox-it.com
Details github.com github.com
Details github.io mitre-attack.github.io
Details github.io iranthreats.github.io
Details govcert.ch www.govcert.ch
Details grayhatforum.org www.grayhatforum.org
Details guidepointsecurity.com www.guidepointsecurity.com
Details h3x.eu tracker.h3x.eu
Details hacksys.io hacksys.io
Details harrisonsand.com harrisonsand.com
Details hawkinsecurity.com ww25.hawkinsecurity.com
Details hawkinsecurity.com hawkinsecurity.com
Details hitb.org news.hitb.org
Details horizon3.ai go.horizon3.ai
Details imminentmethods.info www.imminentmethods.info
Details inquest.net blog.inquest.net
Details intezer.com analyze.intezer.com
Details itsecuritynews.info www.itsecuritynews.info
Details johannesbader.ch johannesbader.ch
Details josephfoulds.com josephfoulds.com
Details kasperskycontenthub.com kasperskycontenthub.com
Details kennasecurity.com www.kennasecurity.com
Details knapsy.com blog.knapsy.com
Details kozikow.com kozikow.com
Details kz-cert.kz www.kz-cert.kz
Details l-team.org l-team.org
Details ledecodeur.ch www.ledecodeur.ch
Details linkedin.com www.linkedin.com
Details linkedin.com pk.linkedin.com
Details linuxsecurity.com linuxsecurity.com
Details llvm.org blog.llvm.org
Details lukasstefanko.com lukasstefanko.com
Details math1as.com math1as.com
Details medium.com wentzwu.medium.com
Details medium.com medium.com
Details medium.com gi7w0rm.medium.com
Details mega.nz mega.nz
Details microsoft.com msrc.microsoft.com
Details microsoft.com msrc-blog.microsoft.com
Details mitre.org collaborate.mitre.org
Details ms509.com www.ms509.com
Details nanocore.io nanocore.io
Details nationalcybersecurity.com nationalcybersecurity.com
Details nccgroup.com www.nccgroup.com
Details nccgroup.trust www.nccgroup.trust
Details netmux.com www.netmux.com
Details nj.gov www.cyber.nj.gov
Details nsfocus.net blog.nsfocus.net
Details objective-see.com objective-see.com
Details objective-see.org objective-see.org
Details orcustechnologies.com orcustechnologies.com
Details packetstormsecurity.com packetstormsecurity.com
Details parsiya.net parsiya.net
Details phish.ai www.phish.ai
Details portswigger.net portswigger.net
Details prestashop-project.org build.prestashop-project.org
Details prestashop.com build.prestashop.com
Details prevasio.com prevasio.com
Details prevasio.com www.prevasio.com
Details proofpoint.com www.proofpoint.com
Details qq.com mp.weixin.qq.com
Details redpacketsecurity.com www.redpacketsecurity.com
Details redpill-linpro.com www.redpill-linpro.com
Details rewterz.com www.rewterz.com
Details ripstech.com blog.ripstech.com
Details riskiq.com community.riskiq.com
Details rumble.run www.rumble.run
Details runzero.com www.runzero.com
Details s21sec.com www.s21sec.com
Details sans.edu isc.sans.edu
Details schneier.com www.schneier.com
Details schuermann.eu www.schuermann.eu
Details sec-down.com www.sec-down.com
Details seculert.com www.seculert.com
Details securityintelligence.com securityintelligence.com
Details securityjoes.com www.securityjoes.com
Details seecreen.com seecreen.com
Details softscheck.com www.softscheck.com
Details sonarsource.com www.sonarsource.com
Details sourcesecurity.com www.sourcesecurity.com
Details strcpy.info blog.strcpy.info
Details sufficientlysecure.org www.sufficientlysecure.org
Details team-cymru.com www.team-cymru.com
Details threatview.io threatview.io
Details trendmicro.com www.trendmicro.com
Details umangis.me blog.umangis.me
Details wilbursecurity.com www.wilbursecurity.com
Details wilbursecurity.com ww1.wilbursecurity.com
Details wojciechregula.blog wojciechregula.blog
Details wp.mil.pl csirt-mon.wp.mil.pl
Details wuft.org www.wuft.org
Details www.idf.il www.idf.il
Details yahoo.com finance.yahoo.com
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 262 腾讯安全威胁情报中心 https://wechat2rss.xlab.app/feed/034265b14906a59ef7cf1fcbd56699b54a696094.xml 2024-08-30 22:08
Details 164 https://media.cert.europa.eu/rss?type=category&id=SocialEngineering&language=en&duplicates=false 2024-08-30 22:08
Details 368 Schneier on Security https://www.schneier.com/feed/atom 2024-08-30 22:08
Details 16 Arctic Wolf https://arcticwolf.com/feed/ 2024-08-30 22:08
Details 266 奇安信 CERT https://wechat2rss.xlab.app/feed/981c000a01bbdc1f128d260cc91c15d3a6afb530.xml 2024-08-30 22:08
Details 265 360数字安全 https://wechat2rss.xlab.app/feed/85e7bf4fe192ded1a15f130aa43ac306d227f61b.xml 2024-08-30 22:08
Details 142 SANS Internet Storm Center, InfoCON: green https://isc.sans.edu/rssfeed_full.xml 2024-08-30 22:08
Details 163 https://media.cert.europa.eu/rss?type=category&id=Malware&language=en&duplicates=false 2024-08-30 22:08
Details 56 Latest Articles - BlackBerry Blogs https://blogs.blackberry.com/en/feed.rss 2024-08-30 22:08
Details 442 Daily Dark Web https://dailydarkweb.net/feed/ 2024-08-30 22:08
Details 162 https://media.cert.europa.eu/rss?type=category&id=APTFilter&language=en&duplicates=false 2024-08-30 22:08
Details 263 三六零CERT https://wechat2rss.xlab.app/feed/2dbce2e5f7b49dc8415db7a0ab325929e0f5d8c3.xml 2024-08-30 22:08
Details 264 安全分析与研究 https://wechat2rss.xlab.app/feed/62ba31603ffe26b5a8eca9ddaa434ea612445c10.xml 2024-08-30 22:08
Details 26 Check Point Blog https://blog.checkpoint.com/feed/ 2024-08-30 22:08
Details 361 RedPacket Security https://www.redpacketsecurity.com/feed/ 2024-08-30 22:08
Details 76 Cyber Defence Analysis for Blue & Purple Teams https://bluepurple.binaryfirefly.com/feed 2024-08-30 22:08
Details 316 Horizon3.ai https://www.horizon3.ai/feed/ 2024-08-30 22:08
Details 186 Objective-See's Blog https://objective-see.org/rss.xml 2024-08-30 22:08
Details 5 绿盟科技技术博客 http://blog.nsfocus.net/feed/ 2024-08-30 22:08
Details 212 Cybercrime News ≈ Packet Storm https://rss.packetstormsecurity.com/news/tags/cybercrime/ 2024-08-30 22:08
Details 267 奇安信威胁情报中心 https://wechat2rss.xlab.app/feed/b93962f981247c0091dad08df5b7a6864ab888e9.xml 2024-08-30 22:08
Details 95 Cyberstanc Blog https://cyberstanc.com/blog/rss/ 2024-08-30 22:08
Details 377 Team Cymru https://www.team-cymru.com/blog-feed.xml 2024-08-30 22:08
Details 9 Adlumin Cybersecurity https://adlumin.com/feed/ 2024-08-30 22:08
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Details 371 Security Joes https://www.securityjoes.com/blog-feed.xml 2024-08-30 22:08
Details 499 ClearSky Cyber Security http://www.clearskysec.com/feed/ 2024-08-31 04:08
Details 6 National Cyber Security Consulting http://nationalcybersecurity.com/feed/ 2024-08-30 22:08
Details 80 CERT-UA RSS Feed https://cert.gov.ua/api/articles/rss 2024-08-30 22:08
Details 227 X-Force – Security Intelligence https://securityintelligence.com/category/x-force/feed/ 2024-08-30 22:08