ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
APT28 | Targets | 3 | APT28, also known as Fancy Bear, is a threat actor linked to Russia and has been involved in numerous cyber espionage campaigns. The group is notorious for its sophisticated tactics, techniques, and procedures (TTPs). Recently, NATO and the EU formally condemned APT28's activities, acknowledging the |
Bluedelta | Unspecified | 1 | Bluedelta is a threat actor associated with the Russian state-sponsored hacking operation APT28 or Fancy Bear. In a recent spear-phishing campaign that began in November 2021, several government entities and a military aviation organization in Ukraine had their email servers targeted by Bluedelta. T |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2020-35730 | Unspecified | 5 | CVE-2020-35730 is a Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail, first discovered three years ago. The flaw has been actively exploited by threat actors in various campaigns. In the BlueDelta and APT28 campaigns, spear-phishing techniques were employed, with email attachments desig |
Follina | Unspecified | 2 | Follina, also known as CVE-2022-30190, is a notable software vulnerability that was discovered and exploited in the first half of 2022. This flaw, found in the Microsoft Windows Support Diagnostic Tool (MSDT), was weaponized by TA413, a cyber threat actor group with suspected ties to China. The grou |
CVE-2022-30190 | Unspecified | 1 | CVE-2022-30190, also known as the "Follina" vulnerability, is a high-risk software flaw in the Microsoft Support Diagnostic Tool that allows for remote code execution. This 0-day vulnerability was disclosed in May 2022 and has since been exploited by threat actors, including TA413, who weaponized it |
CVE-2021-44026 | Unspecified | 1 | None |
Source | CreatedAt | Title |
---|---|---|
Securityaffairs | 3 months ago | NATO and the EU formally condemned APT28 cyber espionage |
Securityaffairs | 8 months ago | Russia's APT8 exploited Outlook 0day to target EU NATO members |
Securityaffairs | 8 months ago | Russia-linked APT28 group spotted exploiting Outlook flaw to hijack MS Exchange accounts |
CERT-EU | 8 months ago | Advanced threat predictions for 2024 – GIXtools |
Securelist | 8 months ago | Kaspersky Security Bulletin: APT predictions 2024 |
CERT-EU | 9 months ago | Several French critical networks subjected to Russian APT attacks |
CERT-EU | 9 months ago | How APT28 Infiltrates Networks in French Universities & Nuclear Plants Without Detection |
Securityaffairs | 9 months ago | ANSSI warns of Russia-linked APT28 attacks on French entities |
Checkpoint | a year ago | 3rd July – Threat Intelligence Report - Check Point Research |
CERT-EU | a year ago | Microsoft warns of rise in credential stealing attacks by Russia-linked group |
CERT-EU | a year ago | Several bugs added to CISA vulnerability catalog |
CERT-EU | a year ago | Ex-FBI employee jailed for mishandling classified material |
Securityaffairs | a year ago | CISA adds recently disclosed Apple flaws to its Known Exploited Vulnerabilities catalog |
CERT-EU | a year ago | CISA Tells US Agencies to Patch Exploited Roundcube, VMware Flaws |
CERT-EU | a year ago | Cyber security week in review: June 23, 2023 |
CERT-EU | a year ago | Governmental Agencies Ordered by CISA to Patch Vulnerabilities Exploited by Russian APT Groups |
CERT-EU | a year ago | CISA Adds Six Known Exploited Vulnerabilities to Catalog | CISA |
Securityaffairs | a year ago | APT28 hacked Roundcube email servers of Ukrainian entities |
CERT-EU | a year ago | Russian hackers breach Ukrainian government and military entities |
BankInfoSecurity | a year ago | Ukraine Tracks Multiple Spear-Phishing Campaigns From Russia |