Click here to download all references as Bib-File.•
2022-04-04
⋅
Cloudsek
⋅
Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant |
2022-03-31
⋅
CrowdStrike
⋅
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 |
2022-03-31
⋅
CrowdStrike
⋅
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 |
2022-03-28
⋅
Sentinel LABS
⋅
Pwning Microsoft Azure Defender for IoT | Multiple Flaws Allow Remote Code Execution for All |
2022-03-28
⋅
Sentinel LABS
⋅
Pwning Microsoft Azure Defender for IoT | Multiple Flaws Allow Remote Code Execution for All |
2022-03-28
⋅
Bleeping Computer
⋅
Microsoft Exchange targeted for IcedID reply-chain hijacking attacks IcedID |
2022-03-24
⋅
Threat Post
⋅
Microsoft Help Files Disguise Vidar Malware Vidar |
2022-03-24
⋅
CSO Online
⋅
Microsoft help files repurposed to contain Vidar malware in new campaign Vidar |
2022-03-24
⋅
Bleeping Computer
⋅
Malicious Microsoft Excel add-ins used to deliver RAT malware JSSLoader |
2022-03-23
⋅
SecurityAffairs
⋅
It’s official, Lapsus$ gang compromised a Microsoft employee’s account RedLine Stealer |
2022-03-22
⋅
Microsoft
⋅
DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS |
2022-03-22
⋅
Microsoft
⋅
DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS |
2022-03-22
⋅
Microsoft
⋅
DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction RedLine Stealer LAPSUS |
2022-03-22
⋅
Bitdefender
⋅
BitRAT Malware Seen Spreading Through Unofficial Microsoft Windows Activators BitRAT |
2022-03-22
⋅
The Hacker News
⋅
Microsoft and Okta Confirm Breach by LAPSUS$ Extortion Group RedLine Stealer |
2022-03-22
⋅
Bleeping Computer
⋅
Microsoft confirms they were hacked by Lapsus$ extortion group RedLine Stealer |
2022-03-16
⋅
Microsoft
⋅
Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure TrickBot |
2022-03-16
⋅
Microsoft
⋅
Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure TrickBot |
2022-03-11
⋅
Microsoft
⋅
Part 2: LockBit 2.0 ransomware bugs and database recovery attempts LockBit |
2022-03-11
⋅
Microsoft
⋅
Part 1: LockBit 2.0 ransomware bugs and database recovery attempts LockBit |