ID | Votes | Profile Description |
---|---|---|
CVE-2022-23748 | 1 | CVE-2022-23748 is a software vulnerability, specifically a flaw in the design or implementation of Audinate's Dante Discovery software. This vulnerability allows for malicious exploitation via DLL side-loading schemes, where the affected software, due to its flawed design, loads and executes a malic |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Toddycat | has used | 1 | ToddyCat is a sophisticated Advanced Persistent Threat (APT) actor, likely Chinese-speaking, that has been active since at least December 2020. It primarily operates in Asia, targeting government entities in Malaysia, Thailand, and Pakistan. In 2022, Kaspersky reported finding ToddyCat actors using |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
DARKReading | a month ago | China-Linked Espionage Groups Target Asian Telecoms |
CERT-EU | 9 months ago | ‘Stayin’ Alive’ cyber espionage campaign targets telecoms, governments in Asia |
CERT-EU | 9 months ago | ToddyCat hackers use 'disposable' malware to target Asian telecoms |
CERT-EU | 9 months ago | Researchers Uncover Ongoing Attacks Targeting Asian Governments and Telecom Giants |
InfoSecurity-magazine | 9 months ago | Chinese APT ToddyCat Targets Asian Telecoms, Governments |
CERT-EU | 9 months ago | Asian governments, telcos impacted by ToddyCat-linked attack campaign |
Securityaffairs | 9 months ago | Stayin' Alive campaign targets high-profile Asian government and telecom entities. Is it linked to ToddyCat APT? |
Checkpoint | 10 months ago | Stayin’ Alive - Targeted Attacks Against Telecoms and Government Ministries in Asia - Check Point Research |