From 5a7f3a72073f85b10974539b8428cf49ecb8c6f1 Mon Sep 17 00:00:00 2001 From: Rony Date: Mon, 25 Jul 2022 17:17:52 +0530 Subject: [PATCH] fix --- clusters/threat-actor.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 9260d14..e9d25bc 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -9779,7 +9779,7 @@ "https://media-exp1.licdn.com/dms/document/C561FAQHhWFRcWmdCPw/feedshare-document-pdf-analyzed/0/1639591145314?e=1658966400&v=beta&t=_uCcyEVg6b_VDiBTvWQIXtBOdQ1GQAAydqGyq62KA3E", "https://www.sentinelone.com/wp-content/uploads/2021/08/SentinelOne_-SentinelLabs_ShadowPad_WP_V2.pdf", "https://www.pwc.co.uk/issues/cyber-security-services/research/chasing-shadows.html", - "https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools, + "https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools", "https://decoded.avast.io/luigicamastra/backdoored-client-from-mongolian-ca-monpass" ], "synonyms": [