APT

Cyber espionage campaign targets India and Tibetan activists

Security experts at FireEye uncovered a cyber espionage campaign that targeted organizations in India and the Tibetan activists. Security firm…

10 years ago

Blue Termite APT group focuses on Japanese organizations

Security experts at Kaspersky Lab have analyzed the cyber attacks run by the Blue Termite APT, a hacking crew group…

11 years ago

The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from…

11 years ago

A secret NSA map shows successful Chinese attacks

The NBC News published a secret NSA map reporting the locations of “Victims of Chinese Cyber Espionage" attacks that resulted…

11 years ago

Wekby APT attacks leverage Hacking Team exploits

According to the experts at Volexity the Flash Player exploit has been leveraged in spear phishing campaign launched by the…

11 years ago

Morpho, the financially motivated espionage target giant firms

Morpho is the name of a financially motivated espionage group that targets large enterprises, including Microsoft, Apple, Twitter, and Facebook.…

11 years ago

Cyber espionage – Russia and China are targeting British Companies and Others

Ongoing incidents have brought to light the power of both Russia and China in the field of cyber espionage. Their…

11 years ago

The Winnti hacking crew is now targeting pharmaceutical and telecoms companies

Security experts at Kaspersky collected evidence that the Winniti APT is moving beyond the gaming industry targeting telecoms and big…

11 years ago

Authors of Duqu 2.0 used a stolen digital certificate in attacks

Malware authors behind the Duqu 2.0 used a stolen certificate from the Foxconn company to implement a persistence mechanism and…

11 years ago

US financial industry moves under a rising wave of Cyberattacks and Zero-Day threats on I.R.S Tax Returns

US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are…

11 years ago

This website uses cookies.