APT43 (Kimsuky, Thallium) – North Korea
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated ...
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated ...
APT42 is an Iranian state-sponsored cyber espionage group tasked with conducting information collection and surveillance operations against individuals and organizations.
The Dark Pink advanced persistent threat (APT) group, also known as Saaiwc, has been linked to a new wave of ...
A subgroup of Cobalt Mirage is using a new custom malware dubbed "Drokbk" to attack a variety of US organizations, using ...
An Iranian APT actor known as Agrius has been attributed as behind a set of data wiper attacks aimed at diamond industries ...
A malicious campaign targeting the Middle East is likely linked to BackdoorDiplomacy, an advanced persistent threat (APT) group with ties to ...
APT41 has stolen at least $20m from US COVID-relief funds, in what appears to be a first-of-its kind campaign, according ...
Volexity researchers warn of a new malware campaign conducted by the North Korea-linked Lazarus APT against cryptocurrency users.
APT campaigns, phishing, credit card/cryptocurrency fraud, DDoS attacks, and identity theft are among the threats faced by organizations and audiences.
The targeted entities are media groups, diplomatic agencies, government and public sector organizations, and think tanks in Japan.
Security through data
© 2023 | CyberMaterial | All rights reserved.
World’s #1 Cybersecurity Repository
© 2022 Cybermaterial - Security Through Data .