APT43 (Kimsuky, Thallium) – North Korea
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated ...
APT43 is a prolific cyber operator that supports the interests of the North Korean regime. The group combines moderately sophisticated ...
APT42 is an Iranian state-sponsored cyber espionage group tasked with conducting information collection and surveillance operations against individuals and organizations.
Kaspersky researchers have unveiled the activities of an undocumented Advanced Persistent Threat (APT) group named GoldenJackal.
A previously unknown advanced persistent threat (APT) group named Red Stinger has been identified, targeting Eastern European entities.
The APT group, SideWinder, has been accused of deploying a backdoor in attacks against Pakistan government organizations in a campaign.
Researchers have discovered that an APT group, known as Dragon Breath, has employed a new DLL sideloading technique to distribute ...
North Korea-linked Advanced Persistent Threat (APT) group, Kimsuky, has been found to be using a new malware tool named ReconShark ...
Ukrainian Government CERT-UA has issued a warning about destructive cyberattacks against Ukraine's public sector by the Sandworm APT group.
The victims of the campaign are mostly members of an international NGO located in the provinces of Gansu, Guangdong, and ...
The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe has targeted Indian government organizations and military personnel.
Security through data
© 2023 | CyberMaterial | All rights reserved.
World’s #1 Cybersecurity Repository
© 2022 Cybermaterial - Security Through Data .