UNKNOWN
Tags
Common Information
Type Value
UUID f6543d73-e647-42d8-861e-28ce2052e4a8
Fingerprint 7bfae3c8a59c063d
Analysis status DONE
Considered CTI value 0
Text language
Published None
Added to db Jan. 18, 2023, 10:57 p.m.
Last updated Sept. 1, 2024, 7:39 a.m.
Headline UNKNOWN
Title UNKNOWN
Detected Hints/Tags/Attributes 0/0/0
Source URLs
Redirection Url
Details Source https://cybellum.com/cy-2017-011-type-confusion-in-adobe-acrobat/
Details Source https://www.checkmarx.com/2014/02/05/us-cert-sochi-2014-advisory/
Details Source https://www.checkmarx.com/2014/03/19/cybercrime-harming-bitcoin/
Details Source https://www.checkmarx.com/2018/02/26/secure-online-banking-app/
Details Source https://www.checkmarx.com/2018/03/19/decrypting-jobcrypter/
Details Source http://blogs.microsoft.com/blog/2014/06/30/microsoft-takes-onglobal-cybercrime-epidemic-in-tenth-malware-disruption/
Details Source http://phishme.com/kovter-ad-fraud-trojan-now-shipping-locky-ransomware/
Details Source https://blog.checkpoint.com/2022/07/13/a-hit-is-made-suspected-india-based-sidewinder-apt-successfully-cyber-attacks-pakistan-military-focused-targets/
Details Source https://blog.cobaltstrike.com/2017/07/10/living-the-ghost-life-announcing-specter-ops-inc/
Details Source https://blog.cobaltstrike.com/2017/11/01/specterops-acquires-minis/
Details Source https://blog.exodusintel.com/2017/10/23/introduction-to-embedded-exploitation/
Details Source https://blog.radware.com/security/2018/01/rethinking-scrubbing-center/
Details Source https://cofense.com/2018-cheap-easy-malware-flooded-corporate-inboxes/
Details Source https://cofense.com/advanced-phishing-campaign-delivers-quasar-rat/
Details Source https://cofense.com/analysing-trickbot-doesnt-tricky/
Details Source https://cofense.com/analysts-view-surging-powershell-based-malware/
Details Source https://cofense.com/attackers-use-bag-tricks-target-greek-banking-customers/
Details Source https://cofense.com/azorult-malware-finds-new-ride-recent-stealer-phishing-campaign/
Details Source https://cofense.com/blog/tactics-of-a-prolific-phishing-campaign-abusing-dropbox
Details Source https://cofense.com/blog/threat-actors-abuse-linkedin-slink-to-bypass-secure-email-gateways
Details Source https://cofense.com/closer-look-qakbot-malware-dangerous/
Details Source https://cofense.com/double-duty-dridex-banking-malware-delivered-rms-rat/
Details Source https://cofense.com/emotet-gang-switches-highly-customized-templates-utilizing-stolen-email-content-victims/
Details Source https://cofense.com/emotet-update-new-c2-communication-followed-new-infection-chain/
Details Source https://cofense.com/flash-update-emotet-gang-distributes-first-japanese-campaign/
Details Source https://cofense.com/forget-fear-phishme-finds-entertainment-makes-irresistible-phishing-attack/
Details Source https://cofense.com/geodo-trickbot-malware-morph-bigger-threats/
Details Source https://cofense.com/h-worm-jrat-malware-two-rats-better-one/
Details Source https://cofense.com/italian-dhl-themed-phishing-leads-ursnif-spambot/
Details Source https://cofense.com/kovter-ad-fraud-trojan-now-shipping-locky-ransomware/
Details Source https://cofense.com/latest-software-functionality-abuse-url-internet-shortcut-files-abused-deliver-malware/
Details Source https://cofense.com/little-click-sending-browser-mines/
Details Source https://cofense.com/malware-delivery-ole-packages-carve-market-share-2017-threat-landscape/
Details Source https://cofense.com/microsoft-office-macros-still-leader-malware-delivery/
Details Source https://cofense.com/nanocore-variant-delivered-uue-files/
Details Source https://cofense.com/new-phishing-attacks-use-pdf-docs-slither-past-gateway/
Details Source https://cofense.com/new-phishing-campaign-bypasses-microsoft-atp-deliver-adwind-utilities-industry/
Details Source https://cofense.com/new-phishing-campaign-uses-captcha-bypass-email-gateway/
Details Source https://cofense.com/new-phishing-emails-deliver-malicious-iso-files-evade-detection/
Details Source https://cofense.com/oh-behave-simulation-analysis/
Details Source https://cofense.com/one-ip-host-uncovering-sprawling-crime-ring/
Details Source https://cofense.com/phishing-attacker-takes-american-express-victims-credentials/
Details Source https://cofense.com/phishing-attackers-abusing-wetransfer-evade-email-gateways/
Details Source https://cofense.com/phishing-campaigns-imitating-ceos-bypass-microsoft-gateway-target-energy-sector/
Details Source https://cofense.com/phishing-campaigns-manipulating-windows-control-panel-extension-deliver-banking-trojans/
Details Source https://cofense.com/phishing-emails-com-extensions-hitting-finance-departments/
Details Source https://cofense.com/phishme-launches-first-free-phishing-simulation-solution-small-businesses/
Details Source https://cofense.com/russian-troldesh-aka-encoder-858-shade-back/
Details Source https://cofense.com/sage-locky-ransomware-now-sharing-delivery-infrastructure-phishing-attacks/
Details Source https://cofense.com/shadow-wannacry-jaff-ransomware-arrives-using-familiar-phishing-techniques/
Details Source https://cofense.com/sharing-isnt-caring-phishing-attacks-abusing-file-sharing-sites/
Details Source https://cofense.com/sigma-ransomware-resurfaces-following-three-month-disappearance/
Details Source https://cofense.com/staggering-amount-stolen-data-heading-zoho-domains/
Details Source https://cofense.com/staying-king-krab-gandcrab-malware-keeps-step-ahead-network-defenses/
Details Source https://cofense.com/threat-actors-customize-urls-avoid-detection/
Details Source https://cofense.com/threat-actors-seek-credentials-even-reach-url/
Details Source https://cofense.com/threats-of-terror-pervade-recent-extortion-phishing-campaigns/
Details Source https://cofense.com/trickbot-operators-rapidly-adopt-plug-delivery-possibly-following-dreambots-lead/
Details Source https://cofense.com/trickbot-using-google-docs-trick-proofpoints-gateway/
Details Source https://cofense.com/triple-threat-phishing-campaign-used-3-separate-vectors/
Details Source https://cofense.com/uk-banking-phish-targets-2-factor-information/
Details Source https://cofense.com/unsubcribe-emails-subscribe-loda-rat-2/
Details Source https://cofense.com/update-necurs-botnet-banks-second-bite-apple-new-malware-delivery-method/
Details Source https://cofense.com/vjw0rm-malware-heres-watch/
Details Source https://cofense.com/vulture-stealer-banload-misses-chrome-extension-receives/
Details Source https://cofense.com/wide-spread-ursnif-campaign-goes-live/
Details Source https://cofense.com/zeus-panda-advanced-banking-trojan-gets-creative-scam-affluent-victims-italy/
Details Source https://cqureacademy.com/blog/penetration-testing/rubber-ducky
Details Source https://labs.detectify.com/2021/11/05/how-ssl-certificates-are-leaking-sensitive-information/
Details Source https://leastauthority.com/blog/announcing-a-new-release-of-gridsync/
Details Source https://logrhythm.com/blog/bremer-bank-enhances-security-maturity-case-study/
Details Source https://logrhythm.com/blog/journey-ai-enabled-soc-advancing-science-of-threat-detection/
Details Source https://nsslabs.com/blog/company/aep-public-test-announcement/
Details Source https://nsslabs.com/blog/company/putting-customers-first/
Details Source https://nvisium.com/blog/2011/05/26/revisiting-android-tapjacking/
Details Source https://nvisium.com/blog/2014/02/28/automated-android-apk-unpacking/
Details Source https://nvisium.com/blog/2014/03/14/burp-app-store/
Details Source https://nvisium.com/blog/2014/05/23/a-more-secure-development-lifecycle-iii/
Details Source https://nvisium.com/blog/2014/06/23/dating-securely-in-mobile-age/
Details Source https://nvisium.com/blog/2014/07/11/getting-started-with-android-wear/
Details Source https://nvisium.com/blog/2014/07/23/intro-to-burpsuite-part-iv-being/
Details Source https://nvisium.com/blog/2014/07/30/swift-core-data-format-string-injection/
Details Source https://nvisium.com/blog/2014/08/06/ios-assessments-with-burp-ifunbox-sqlite/
Details Source https://nvisium.com/blog/2014/08/13/intro-to-burpsuite-v-extracting/
Details Source https://nvisium.com/blog/2014/08/27/the-appsec-newbs-journey-part-i-welcome/
Details Source https://nvisium.com/blog/2014/08/29/xssvalidator-v120-released/
Details Source https://nvisium.com/blog/2014/09/24/an-update-on-railsgoat-vagrantdocker/
Details Source https://nvisium.com/blog/2014/10/15/docker-cache-friend-or-foe/
Details Source https://nvisium.com/blog/2014/11/06/security-challenge-universal-studios/
Details Source https://nvisium.com/blog/2014/12/10/synergies-in-application-security/
Details Source https://nvisium.com/blog/2014/12/17/5-tips-for-secure-online-shopping/
Details Source https://nvisium.com/blog/2015/05/12/method-interchange-forgotten/
Details Source https://nvisium.com/blog/2015/05/19/a-survey-of-google-trusted-stores/
Details Source https://nvisium.com/blog/2015/05/21/dont-break-your-backbone-xss-mitigation/
Details Source https://nvisium.com/blog/2015/05/27/implementing-coap-secure-way-part-i/
Details Source https://nvisium.com/blog/2015/06/04/seccasts-live-beyond-pentest-evolving/
Details Source https://nvisium.com/blog/2015/06/11/regex-regularly-exploitable/
Details Source https://nvisium.com/blog/2015/07/09/intro-to-burpsuite-part-vi-burpsuite/
Details Source https://nvisium.com/blog/2015/07/30/mitigating-javascript-context-cross/
Details Source https://nvisium.com/blog/2015/09/11/crossed-by-cross-site-scripting/
URL Provider
Details Provider Source level domain
Details anitian.com www.anitian.com
Details bluvector.io www.bluvector.io
Details cadosecurity.com www.cadosecurity.com
Details checkmarx.com www.checkmarx.com
Details checkpoint.com blog.checkpoint.com
Details checkpoint.com research.checkpoint.com
Details cobaltstrike.com blog.cobaltstrike.com
Details cofense.com cofense.com
Details cqureacademy.com cqureacademy.com
Details cybellum.com cybellum.com
Details cybersecurity-insiders.com www.cybersecurity-insiders.com
Details darknet.org.uk www.darknet.org.uk
Details detectify.com labs.detectify.com
Details esecurityplanet.com www.esecurityplanet.com
Details exodusintel.com blog.exodusintel.com
Details geek.com www.geek.com
Details leastauthority.com leastauthority.com
Details logrhythm.com logrhythm.com
Details microsoft.com blogs.microsoft.com
Details netskope.com resources.netskope.com
Details nowsecure.com www.nowsecure.com
Details nsslabs.com www.nsslabs.com
Details nsslabs.com nsslabs.com
Details nvisium.com nvisium.com
Details perception-point.io perception-point.io
Details phishme.com phishme.com
Details radware.com blog.radware.com
Details rocketcyber.com www.rocketcyber.com
Details silentbreaksecurity.com silentbreaksecurity.com
Details socradar.io socradar.io
Details staysafeonline.org staysafeonline.org
Details sysdig.com sysdig.com
Details virtuesecurity.com www.virtuesecurity.com
Details vmray.com www.vmray.com
Details votiro.com votiro.com
Details votiro.com www.votiro.com
Details wandera.com www.wandera.com
Details whitehatsec.com www.whitehatsec.com