mirror of
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
synced 2024-06-28 09:51:38 +00:00
Auto-Update index.csv
This commit is contained in:
parent
b7ba7dd6bb
commit
7025bd90c6
@ -1535,5 +1535,6 @@ Published,SHA-1,Filename,Download URL
|
||||
2023-01-09,3efdf94296306b558b39d4b2bfab93cb944a0013,INTRINSEC - Emotet returns and deploys loaders,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.09.Emotet_return/INTRINSEC%20-%20Emotet%20returns%20and%20deploys%20loaders.pdf
|
||||
2023-01-11,4d3fa4294df4b901a26c2f9bdbcae7c3be9f244a,Dark Pink APT unleashes malware for deeper and more sinister intrusions in the Asia-Pacific and Europe _ Group-IB Blog,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.11.Dark_Pink_APT/Dark%20Pink%20APT%20unleashes%20malware%20for%20deeper%20and%20more%20sinister%20intrusions%20in%20the%20Asia-Pacific%20and%20Europe%20_%20Group-IB%20Blog.pdf
|
||||
2023-01-26,adc02a61be87eeccc1ea3e3c6a5db73e3946f258,Welcome to Goot Camp_ Tracking the Evolution of GOOTLOADER Operations _ Mandiant,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.01.26.GOOTLOADER_Operations/Welcome%20to%20Goot%20Camp_%20Tracking%20the%20Evolution%20of%20GOOTLOADER%20Operations%20_%20Mandiant.pdf
|
||||
2023-12-21,95f848ff414c5e2288448815427b9f0019449ab9,Intellexa and Cytrox_ From fixer-upper to Intel Agency-grade spyware,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.21.Intellexa_Cytrox/Intellexa%20and%20Cytrox_%20From%20fixer-upper%20to%20Intel%20Agency-grade%20spyware.pdf
|
||||
2023-12-27,f9ebf0bee52c3bcf2193f1ab477359918b00da03,Operation Triangulation_ The last (hardware) mystery _ Securelist,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2023/2023.12.27.Operation_Triangulation/Operation%20Triangulation_%20The%20last%20%28hardware%29%20mystery%20_%20Securelist.pdf
|
||||
2024-01-10,e71c1c4cd3ade02e4291bb9547aa9efbd4ce1a92,Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN _ Volexity,https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/raw/master/2024/2024.01.10.Active_Exploitation_UTA0178/Active%20Exploitation%20of%20Two%20Zero-Day%20Vulnerabilities%20in%20Ivanti%20Connect%20Secure%20VPN%20_%20Volexity.pdf
|
||||
|
|
Loading…
Reference in New Issue
Block a user