Air-Gapped Systems Targeted by Sednit Espionage Group

Air-Gapped Systems Targeted by Sednit Espionage Group

The group is believed to operate since 2005

Darkhotel Espionage Group Targets Executives Staying at Luxury Locations

Darkhotel Espionage Group Targets Executives Staying at Luxury Locations

The group relies on highly advanced zero-day exploits

BlackEnergy APT Targets a Diverse Crowd of Victims

BlackEnergy APT Targets a Diverse Crowd of Victims

Some of the victims are from Europe, Middle East and Asia, but the United States has also been affected

BlackEnergy APT Has a Rich List of Plug-ins for Windows and Linux

BlackEnergy APT Has a Rich List of Plug-ins for Windows and Linux

Malware structure hints at highly organized team behind it

Chinese APT Group Axiom Is Highly Technical and Disciplined

Chinese APT Group Axiom Is Highly Technical and Disciplined

Group exhibits rarely seen level of sophistication

Sophisticated Chinese Espionage Group After Western Advanced Technology

Sophisticated Chinese Espionage Group After Western Advanced Technology

Axiom APT group serves China's strategic interests

Keylogging Framework Used by Multiple Actors in Watering-Hole Attacks

Keylogging Framework Used by Multiple Actors in Watering-Hole Attacks

ScanBox targets a diverse set of organizations

Sednit Malware Used in Operation Pawn Storm Espionage Campaign

Sednit Malware Used in Operation Pawn Storm Espionage Campaign

Very specific victims targeted through spear phishing

Google Drive Used to Host Reconnaissance Data from Government Computers

Google Drive Used to Host Reconnaissance Data from Government Computers

Uploading docs to the cloud is all the malware piece can do

Cyber-Attacks Represented in Threat Map

Cyber-Attacks Represented in Threat Map

Visual representation is based on real information

New Windows Zero-Day Flaw Leveraged in the Wild

New Windows Zero-Day Flaw Leveraged in the Wild

Vulnerability affects all Windows versions save Server 2003

There's a Silver Lining in the Fight Against Cyber Espionage

There's a Silver Lining in the Fight Against Cyber Espionage

Shared threat intelligence helps connect attacks from the same threat actor and indetify the different tools they use

Cyber Espionage Group Leverages at Least Ten Custom Tools in Attacks

Cyber Espionage Group Leverages at Least Ten Custom Tools in Attacks

Group relies even on rootkit code intended for research

Security Firms Form Coalition to Crack Down on Cyber Espionage Group

Security Firms Form Coalition to Crack Down on Cyber Espionage Group

Hacker groups spied on organizations for at least four years

Cyber Espionage Group Exploits New Windows Zero-Day to Get Elevated Privileges

Cyber Espionage Group Exploits New Windows Zero-Day to Get Elevated Privileges

Group is believed to operate under the Chinese flag

Five-Year Long Russian Cyber Espionage Campaign Exploits Windows Zero-Day

Five-Year Long Russian Cyber Espionage Campaign Exploits Windows Zero-Day

Vulnerability affects all Windows desktop editions save XP

China Makes Efforts for Better Cyber Security <em>Reuters</em>

China Makes Efforts for Better Cyber Security Reuters

Attack seems to be China's defense strategy

 
Want more? Browse: