ID | Votes | Profile Description |
---|---|---|
Operation Aurora | 2 | Operation Aurora, also known as APT17, is a notorious malware operation that began in 2009 and is considered one of the most sophisticated cyberattacks ever conducted. It specializes in supply chain attacks, which are attempts to damage an organization by targeting less-secure elements in its supply |
Hydraq | 1 | Hydraq, also known as 9002 RAT, McRAT, Naid, and Aurora, is a malicious software (malware) designed to exploit and damage computer systems. This malware can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once it gains access, it has the potential |
ID | Type | Votes | Profile Description |
---|---|---|---|
Mars | Unspecified | 1 | Mars is a malicious software (malware) that has been discovered by Trend Micro's Mobile Application Reputation Service (MARS) team. This malware is particularly damaging as it involves two new Android malware families related to cryptocurrency mining and financially-motivated scam campaigns, targeti |
Lokibot | Unspecified | 1 | LokiBot is a malicious software, or malware, that was first reported on October 24, 2020. It is designed to exploit and damage computer systems by infiltrating them through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, LokiBot steals personal information |
Lumma Stealer | Unspecified | 1 | Lumma Stealer is a malicious software (malware) that infiltrates systems primarily to steal personal information, disrupt operations, and exploit vulnerabilities. According to the ESET Threat Report H2 2023, Lumma Stealer gained significant traction in the second half of 2023, with its capabilities |
Redline | Unspecified | 1 | RedLine is a malware designed to exploit and damage computer systems by stealing personal information, disrupting operations, or even holding data hostage for ransom. It has been identified as a favorite infostealer among threat actors selling logs through the marketplace 2easy, which also sells Rac |
Stuxnet | Unspecified | 1 | Stuxnet, a notorious malware discovered in 2010, is one of the most infamous Advanced Persistent Threat (APT) attacks in history. This military-grade cyberweapon was co-developed by the United States and Israel to specifically target Iran's nuclear enrichment facility at Natanz. The Stuxnet worm, a |
WannaCry | Unspecified | 1 | WannaCry is a type of malware, specifically ransomware, that caused significant global disruption in 2017. It exploited Windows SMBv1 Remote Code Execution Vulnerabilities (CVE-2017-0144, CVE-2017-0145, CVE-2017-0143), which allowed it to spread rapidly and infect over 200,000 machines across more t |
Lumma | Unspecified | 1 | Lumma is a prominent malware, particularly known as an information stealer. It is delivered through various means, including suspicious downloads, emails, and websites. In one instance observed by Palo Alto Networks’ Unit 42, Lumma was sent over Latrodectus C2 in an infection chain. In another campa |
ID | Type | Votes | Profile Description |
---|---|---|---|
Elderwood | Unspecified | 2 | Elderwood, also known as the Elderwood Group or the Beijing Group, is a notable threat actor believed to be responsible for numerous high-profile cyber attacks and espionage campaigns. The group's activities date back to at least 2005-2006 and have been linked to various significant incidents, inclu |
APT17 | Unspecified | 1 | APT17, also known as Tailgator Team and Deputy Dog, is a threat actor suspected to be affiliated with the Chinese intelligence apparatus. This group has been associated with various aliases including Winnti, PassCV, Axiom, LEAD, BARIUM, Wicked Panda, and GREF. The primary targets of APT17 are the U. |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
BankInfoSecurity | 18 days ago | Cryptocurrency Theft Haul Surges Alongside Crypto Value |
BankInfoSecurity | a month ago | Court: HHS Overstepped HIPAA Authority in Web Tracking Guide |
BankInfoSecurity | 3 months ago | Law Firm to Pay $8M to Settle Health Data Hack Lawsuit |
InfoSecurity-magazine | 4 months ago | Report Slams Microsoft Security Failures in Government Email Breach |
CERT-EU | 5 months ago | How AI has already changed coding forever |
CERT-EU | 5 months ago | Complete Guide to Advanced Persistent Threat (APT) Security |
CERT-EU | 5 months ago | Scientel Solutions Announces Partnership with UK-based Cybersecurity Company, KryptoKloud |
CERT-EU | 5 months ago | Cybersecurity, Other USAF Needs Challenging E-7 Price Talks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting |
CERT-EU | 6 months ago | Database management the easy – and professional – way |
BankInfoSecurity | 6 months ago | NC Health System Agrees to Pay $6.6M in Web Tracking Case |
CERT-EU | 7 months ago | Trusted brands embrace online privacy |
DARKReading | 7 months ago | 10 Years After Yahoo, What’s Changed? (Not Much) |
CERT-EU | 7 months ago | MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024 |
CERT-EU | 7 months ago | MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024 | The Last Watchdog |
CERT-EU | a year ago | Boulder County buys controversial phone-hacking tech using money meant to treat, prevent drug addiction | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker - National Cyber Security Consulting |
CERT-EU | a year ago | Threat landscape in NZ's energy sector in the spotlight |
CERT-EU | a year ago | Warning for anyone who visits adult sites as hackers target users with convincing scam | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker – National Cyber Security Consulting |
CERT-EU | a year ago | New Flaw in WordPress Plugin Used by Over a Million Sites Under Active Exploitation |
DARKReading | a year ago | The Dark Web Is Expanding (As Is the Value of Monitoring It) |
CSO Online | a year ago | Russian hacktivists deploy new AresLoader malware via decoy installers |