watering hole

Experts uncovered a watering hole attack on leading Hong Kong Telecom Site exploiting CVE-2018-4878 flawExperts uncovered a watering hole attack on leading Hong Kong Telecom Site exploiting CVE-2018-4878 flaw

Experts uncovered a watering hole attack on leading Hong Kong Telecom Site exploiting CVE-2018-4878 flaw

Researchers at Morphisec have uncovered a watering hole attack on leading Hong Kong Telecom website exploiting the CVE-2018-4878 flash vulnerability. Security experts…

7 years ago
BitDefender found the first MAC OS version of the X-Agent used by the APT28BitDefender found the first MAC OS version of the X-Agent used by the APT28

BitDefender found the first MAC OS version of the X-Agent used by the APT28

Security experts at Bitdefender discovered a MAC OS version of the X-Agent malware used by the Russian APT28 cyberespionage group.…

8 years ago
APT 28 group is ramping up information warfare against GermanyAPT 28 group is ramping up information warfare against Germany

APT 28 group is ramping up information warfare against Germany

According to the German Intelligence, the APT 28 group, also known as Fancy Bear, is ramping up information warfare against Germany…

9 years ago
Hackers behind the BLACKGEAR espionage campaign now targets JapanHackers behind the BLACKGEAR espionage campaign now targets Japan

Hackers behind the BLACKGEAR espionage campaign now targets Japan

The threat actor behind the Blackgear cyber-espionage campaign that is targeting Japanese entities is the same that hit Taiwan in…

9 years ago
StrongPity APT – Waterhole attacks against Italian and Belgian usersStrongPity APT – Waterhole attacks against Italian and Belgian users

StrongPity APT – Waterhole attacks against Italian and Belgian users

Kaspersky published a report on cyber espionage activities conducted by StrongPity APT that most targeted Italians and Belgians with watering…

9 years ago
Pawn Storm hackers hit the German Christian Democratic Union partyPawn Storm hackers hit the German Christian Democratic Union party

Pawn Storm hackers hit the German Christian Democratic Union party

Researchers at Trend Micro discovered that Pawn Storm threat actor targeted the political party of Chancellor Angela Merkel, the Christian…

9 years ago
Operation Transparent Tribe targets Indian diplomats and militaryOperation Transparent Tribe targets Indian diplomats and military

Operation Transparent Tribe targets Indian diplomats and military

ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber…

9 years ago
Duuzer, a data stealer Trojan targets South Korean organizationsDuuzer, a data stealer Trojan targets South Korean organizations

Duuzer, a data stealer Trojan targets South Korean organizations

Researchers at Symantec uncovered bad actors that have been using a backdoor Trojan dubbed Duuzer to target organizations in South…

10 years ago
The rise of the Japanese Cybercrime UndergroundThe rise of the Japanese Cybercrime Underground

The rise of the Japanese Cybercrime Underground

Researchers at Trend Micro have issued a new report on the Japanese Cybercrime Underground, a growing criminal community with his…

10 years ago
The Panda Emissary APT specialized in defence aerospace projectsThe Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary APT specialized in defence aerospace projects

The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from…

10 years ago