Click here to download all references as Bib-File.•
2024-08-02
⋅
Volexity
⋅
StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms CDDS DUSTPAN MgBot |
2024-01-10
⋅
Volexity
⋅
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN UTA0178 |
2023-03-30
⋅
Volexity
⋅
3CX Supply Chain Compromise Leads to ICONIC Incident 3CX Backdoor IconicStealer |
2022-06-15
⋅
Volexity
⋅
DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach pupy Sliver DriftingCloud |
2022-03-22
⋅
Volexity
⋅
Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS GIMMICK GIMMICK |
2022-02-03
⋅
Volexity
⋅
Operation EmailThief: Active Exploitation of Zero-day XSS Vulnerability in Zimbra TEMP_Heretic |
2021-08-24
⋅
Volexity
⋅
North Korean BLUELIGHT Special: InkySquid Deploys RokRAT RokRAT |
2021-08-17
⋅
Volatility Labs
⋅
North Korean APT37 / InkySquid Infects Victims Using Browser Exploits BLUELIGHT APT37 |
2021-05-27
⋅
Volexity
⋅
Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns Cobalt Strike |
2021-03-02
⋅
Volexity
⋅
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities CHINACHOPPER HAFNIUM |
2020-12-14
⋅
Volexity
⋅
Dark Halo Leverages SolarWinds Compromise to Breach Organizations SUNBURST |
2020-11-06
⋅
Volexity
⋅
OceanLotus: Extending Cyber Espionage Operations Through Fake Websites Cobalt Strike KerrDown APT32 |
2020-04-21
⋅
Volexity
⋅
Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant |
2019-09-11
⋅
Volexity
⋅
Vulnerable Private Networks: Corporate VPNs Exploited in the Wild |
2019-09-02
⋅
Volexity
⋅
Digital Crackdown: Large-Scale Surveillance and Exploitation of Uyghurs scanbox POISON CARP |
2018-06-07
⋅
Volexity
⋅
Patchwork APT Group Targets US Think Tanks Quasar RAT Unidentified 047 QUILTED TIGER |
2016-11-09
⋅
Volexity
⋅
PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs PowerDuke |