Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-22MicrosoftMicrosoft Threat Intelligence
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
Storm-2077
2024-11-09Youtube (Microsoft Security Response Center (MSRC))Rachel Giacobozzi
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
Storm-0506 TA2101
2024-11-09MicrosoftRachel Giacobozzi
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
Storm-0826
2024-10-31MicrosoftMicrosoft Threat Intelligence
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
Storm-0940
2024-10-29MicrosoftMicrosoft Threat Intelligence
Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
2024-10-24MicrosoftMicrosoft
Tweet about Storm-0506 and Black Basta
Storm-0506
2024-10-17Microsoft SecurityMicrosoft Threat Intelligence
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access
2024-10-16ASECAhnLab
AhnLab and NCSC Release Joint Report on Microsoft Zero-Day Browser Vulnerability (CVE-2024-38178)
APT37
2024-10-16ASECASEC
An Lab and the National Cyber Security Center (NCSC), joint report distribution and Microsoft browser 0-DAY discovery (CVE-2024-38178)
2024-10-15MicrosoftAkash Chaudhuri, Gourav Khandelwal, Krithika Ramakrishnan, Matthew Mesa, Sagar Patil, Uri Oren
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack
UNC4393
2024-10-03MicrosoftSteven Masada
Protecting Democratic Institutions from Cyber Threats
Callisto
2024-10-03US Court for the District of ColumbiaUS Court for the District of Columbia
Civil Action No. 1:24-cv-02719-RC: Microsoft vs. Star Blizzard
Callisto
2024-09-26MicrosoftMicrosoft Threat Intelligence
Storm-0501: Ransomware attacks expanding to hybrid cloud environments
Storm-0501
2024-09-18Twitter (@MsftSecIntel)Microsoft
Tweet about threat actor Vanilla Tempest
INC GootLoader Storm-0494
2024-08-30MicrosoftMicrosoft Threat Intelligence
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
FudModule
2024-08-14cocomelonccocomelonc
Malware development: persistence - part 26. Microsoft Edge - part 1. Simple C example.
2024-07-29MicrosoftCharles-Edouard Bettan, Danielle Kuznets Nohi, Edan Zwick, Meitar Pinto, Vaibhav Deshmukh
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption
Black Basta Black Basta Storm-0506
2024-06-21ElasticJoe Desimone, Samir Bousseaden
GrimResource - Microsoft Management Console for initial access and evasion
Cobalt Strike
2024-06-02MicrosoftClint Watts
How Russia is trying to disrupt the 2024 Paris Olympic Games
Storm-1679
2024-05-28MicrosoftMicrosoft Threat Intelligence
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks
splitloader