ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
Stuxnet | is related to | 2 | Stuxnet, a notorious malware discovered in 2010, is one of the most infamous Advanced Persistent Threat (APT) attacks in history. This military-grade cyberweapon was co-developed by the United States and Israel to specifically target Iran's nuclear enrichment facility at Natanz. The Stuxnet worm, a |
Duqu | Unspecified | 1 | Duqu is a sophisticated piece of malware that was first discovered in the wild exploiting a zero-day vulnerability (CVE-2011-3402). It's closely related to the notorious Stuxnet worm, which infected thousands of computers across 155 countries and caused significant damage to Iran’s nuclear-enrichmen |
ZLib | Unspecified | 1 | Zlib is a known malware, a harmful program designed to exploit and damage computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can cause significant damage, including stealing personal information, disrupting opera |
Agent.btz | Unspecified | 1 | Agent.btz, also known as ComRAT v4, is a remote access trojan (RAT) developed using C++ and employing a virtual FAT16 file system. This malicious software was one of the earliest backdoors used by Pensive Ursa, a cyber-espionage group. Notably, the malware is frequently used to exfiltrate sensitive |
Regin | Unspecified | 1 | Regin is a highly sophisticated malware, often compared to other top-tier cyberespionage tools such as Duqu, Flame, Equation, and ProjectSauron. Malware is a malicious software designed to exploit and damage computers or devices, often infiltrating systems through suspicious downloads, emails, or we |
Carbon System | Unspecified | 1 | The Carbon System is a sophisticated malware program, designed to exploit and damage targeted computer systems. It is part of a suite of cyber-espionage tools developed by the Turla attackers, known for their advanced capabilities and stealth. The malware infiltrates unsuspecting systems through sus |
ID | Type | Votes | Profile Description |
---|---|---|---|
ProjectSauron | Unspecified | 1 | ProjectSauron, also known as Strider, is an exceptionally sophisticated cyber-espionage platform. It represents the pinnacle of advanced threat actors, comparable in complexity and sophistication to other notable threats such as Equation, Regin, Duqu, and Careto. The platform's design allows it to e |
Flamer | Unspecified | 1 | None |
Dragonfly | Unspecified | 1 | Dragonfly is a notable threat actor known for its malicious activities in the cybersecurity landscape. This group has been particularly active in targeting the energy sector across various countries, including the United States, Switzerland, and Turkey. The tactics employed by Dragonfly often involv |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
Source | CreatedAt | Title |
---|---|---|
DARKReading | 25 days ago | Multi-Malware 'Cluster Bomb' Campaign Drops Widespread Cyber Havoc |
CERT-EU | 5 months ago | Empowering women in cybersecurity at Infosecurity Europe 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting |
CERT-EU | 6 months ago | A guide to the most important characters in Sarah J. Maas' 'Crescent City' series |
CERT-EU | 7 months ago | Gambler suspected of dying in fire after hacking family | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |
CERT-EU | 7 months ago | Techrights — Links 12/12/2023: Google Loses Major Case, Twitter (X) Invites Back Hate Preachers |
CERT-EU | 8 months ago | Feds aimed secret cybersecurity briefing at energy sector executives: memo |
CERT-EU | 8 months ago | 2 environmentalists who were targeted by a hacking network say the public is the real victim |
CERT-EU | 8 months ago | Techrights — Links 16/11/2023: Microsoft Unbans Radical Sites, Biden Meets Winnie the Pooh |
CERT-EU | 9 months ago | He Threatened to Kill the President. Did He Deserve to Die? |
CERT-EU | 9 months ago | Search | arXiv e-print repository |
CERT-EU | 10 months ago | Here comes the son: Is Lachlan Murdoch up to the job? |
CERT-EU | 10 months ago | Techrights — Windows Defender Flags Tor Browser as “Trojan Horse” Malware |
CERT-EU | 10 months ago | New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware |
CERT-EU | a year ago | Attacking your way to accurate answers with breach and attack simulation |
CERT-EU | a year ago | Defender Pretender: When Windows Defender Updates Become a Security Risk |
CERT-EU | a year ago | Windows Defender-Pretender Attack Dismantles Flagship Microsoft EDR |
CERT-EU | a year ago | August 2023 |
CERT-EU | a year ago | New Voting Machine Skepticism Overshadowing 2024 Election |
CERT-EU | a year ago | The most spectacular crypto thefts and how to defend against them |
CERT-EU | a year ago | 48 women are burned, shot or hacked to death with machetes in massacre at Honduras female prison | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |