Click here to download all references as Bib-File.•
2022-10-10
⋅
RiskIQ
⋅
DEV-0832 Leverages Commodity Tools in Opportunistic Ransomware Campaigns BlackCat Mount Locker SystemBC Zeppelin |
2022-10-05
⋅
Microsoft
⋅
Detecting and preventing LSASS credential dumping attacks |
2022-09-30
⋅
Microsoft
⋅
Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082 |
2022-09-29
⋅
Microsoft
⋅
ZINC weaponizing open-source software BLINDINGCAN CLOUDBURST miniBlindingCan |
2022-09-29
⋅
Microsoft
⋅
ZINC weaponizing open-source software BLINDINGCAN CLOUDBURST miniBlindingCan |
2022-09-29
⋅
⋅
GTSC
⋅
Warning Campaign Attack Using Zero Day Vulnerability on Microsoft Exchange Server |
2022-09-22
⋅
Microsoft
⋅
Malicious OAuth applications used to compromise email servers and spread spam |
2022-09-21
⋅
Microsoft
⋅
Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices |
2022-09-21
⋅
Microsoft
⋅
Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices |
2022-09-21
⋅
Microsoft
⋅
Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices |
2022-09-21
⋅
Microsoft
⋅
Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices |
2022-09-21
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 2 |
2022-09-21
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 2 |
2022-09-17
⋅
Twitter (@MsftSecIntel)
⋅
Tweet on click fraud activity DEV-0796 Phlox Tempest |
2022-09-08
⋅
Microsoft
⋅
Microsoft investigates Iranian attacks against the Albanian government ZeroCleare |
2022-09-08
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 1 |
2022-09-08
⋅
Microsoft
⋅
The art and science behind Microsoft threat hunting: Part 1 |
2022-09-07
⋅
Microsoft
⋅
Profiling DEV-0270: PHOSPHORUS’ ransomware operations |
2022-08-25
⋅
Microsoft
⋅
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations MimiKatz |
2022-08-25
⋅
Microsoft
⋅
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations MimiKatz |