Click here to download all references as Bib-File.•
2023-12-18
⋅
Bridewell
⋅
Analysing a Widespread Microsoft 365 Credential Harvesting Campaign Storm-1575 |
2023-12-13
⋅
Microsoft
⋅
Disrupting the gateway services to cybercrime Storm-1152 |
2023-12-12
⋅
Microsoft
⋅
Threat actors misuse OAuth applications to automate financially driven attacks Storm-1283 Storm-1286 |
2023-12-07
⋅
Microsoft
⋅
Russian influence and cyber operations adapt for long haul and exploit war fatigue Storm-1099 |
2023-12-07
⋅
Microsoft
⋅
Star Blizzard increases sophistication and evasion in ongoing attacks Callisto |
2023-12-01
⋅
Microsoft
⋅
Monthly news - December 2023 Pearl Sleet |
2023-12-01
⋅
Twitter (@MsftSecIntel)
⋅
Tweet on Danabot leading to cactus ransomware Cactus DanaBot Storm-1044 |
2023-11-22
⋅
Microsoft
⋅
Diamond Sleet supply chain compromise distributes a modified CyberLink installer LambLoad |
2023-11-09
⋅
Microsoft
⋅
Microsoft shares threat intelligence at CYBERWARCON 2023 Blue Tsunami |
2023-11-02
⋅
Microsoft
⋅
Monthly news - November 2023 Storm-0539 |
2023-11-02
⋅
Microsoft
⋅
Monthly news - November 2023 Storm-0062 |
2023-10-18
⋅
Microsoft
⋅
Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability FeedLoad ForestTiger HazyLoad RollSling Silent Chollima |
2023-10-13
⋅
Twitter (@MsftSecIntel)
⋅
Tweet on Storm-1575 and Dadsec phishing platform Storm-1575 |
2023-10-11
⋅
Microsoft
⋅
Automatic disruption of human-operated attacks through containment of compromised user accounts Akira Akira |
2023-10-11
⋅
Twitter (@MsftSecIntel)
⋅
Tweet on Storm-0062 exploiting CVE-2023-22515 Storm-0062 |
2023-09-14
⋅
Microsoft
⋅
Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets APT33 |
2023-09-12
⋅
Microsoft
⋅
Malware distributor Storm-0324 facilitates ransomware access JSSLoader Storm-0324 |
2023-09-07
⋅
Microsoft
⋅
Sophistication, scope, and scale: Digital threats from East Asia increase in breadth and effectiveness MUSTANG PANDA Raspberry Typhoon |
2023-09-07
⋅
Microsoft
⋅
China, North Korea pursue new targets while honing cyber capabilities |
2023-09-06
⋅
Microsoft
⋅
Results of Major Technical Investigations for Storm-0558 Key Acquisition |