Click here to download all references as Bib-File.•
| 2024-10-15
⋅
Microsoft
⋅
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack UNC4393 |
| 2024-10-03
⋅
Microsoft
⋅
Protecting Democratic Institutions from Cyber Threats Callisto |
| 2024-10-03
⋅
US Court for the District of Columbia
⋅
Civil Action No. 1:24-cv-02719-RC: Microsoft vs. Star Blizzard Callisto |
| 2024-09-26
⋅
Microsoft
⋅
Storm-0501: Ransomware attacks expanding to hybrid cloud environments Storm-0501 |
| 2024-09-18
⋅
Twitter (@MsftSecIntel)
⋅
Tweet about threat actor Vanilla Tempest INC GootLoader Storm-0494 |
| 2024-08-30
⋅
Microsoft
⋅
North Korean threat actor Citrine Sleet exploiting Chromium zero-day FudModule Lazarus Group |
| 2024-08-14
⋅
cocomelonc
⋅
Malware development: persistence - part 26. Microsoft Edge - part 1. Simple C example. |
| 2024-07-29
⋅
Microsoft
⋅
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption Black Basta Black Basta Storm-0506 |
| 2024-06-21
⋅
Elastic
⋅
GrimResource - Microsoft Management Console for initial access and evasion Cobalt Strike |
| 2024-06-02
⋅
Microsoft
⋅
How Russia is trying to disrupt the 2024 Paris Olympic Games Storm-1679 |
| 2024-05-28
⋅
Microsoft
⋅
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks splitloader |
| 2024-05-15
⋅
Microsoft
⋅
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Black Basta Cobalt Strike QakBot SystemBC |
| 2024-05-15
⋅
Microsoft
⋅
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Black Basta Cobalt Strike QakBot UNC4393 |
| 2024-05-01
⋅
Microsoft
⋅
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps |
| 2024-04-25
⋅
Microsoft
⋅
Guidance for Incident Responders |
| 2024-04-22
⋅
Microsoft
⋅
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials GooseEgg |
| 2024-04-17
⋅
Microsoft
⋅
Russian US election interference targets support for Ukraine after slow start |
| 2024-04-17
⋅
Microsoft
⋅
Nation-states engage in US-focused influence operations ahead of US presidential election |
| 2024-04-17
⋅
Microsoft
⋅
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters |
| 2024-04-13
⋅
cyber5w
⋅
Analysis of malicious Microsoft office macros AsyncRAT Ave Maria |