APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days
Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.
Read MoreResearch indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.
Read MoreThe threat group has leaked data that it claims was stolen in the breach and is promising more government-targeted attacks.
Read MoreSource code and Bitcoin transactions point to the malware, which emerged in March 2020, being the work of APT38, researchers at Trellix said.
Read MoreA state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data.
Read MoreThe threat group known as TA410 that wields the sophisticated FlowCloud RAT actually has three subgroups operating globally, each with their own toolsets and targets.
Read MoreAt least five APTs are believed involved with attacks tied ground campaigns and designed to damage Ukraine’s digital infrastructure.
Read MoreA campaign by APT37 used a sophisticated malware to steal information about sources , which appears to be a successor to Bluelight.
Read MoreGhostwriter is one of 3 campaigns using war-themed attacks, with cyber-fire coming in from government-backed actors in China, Iran, North Korea & Russia.
Read MoreThe supply-chain attack on the U.S. energy sector targeted thousands of computers at hundreds of organizations, including at least one nuclear power plant.
Read MoreMustang Panda’s already sophisticated cyberespionage campaign has matured even further with the introduction of a brand-new PlugX RAT variant.
Read MoreBy continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.