Chinese APT groups target Southeast Asian nations in cyberespionage campaigns
The observed cyberattack employed phishing emails as the primary method of infiltration.
The observed cyberattack employed phishing emails as the primary method of infiltration.
The SqzrFramework480 package came under scrutiny due to its unusual behavior.
SQL injections succeed because software developers fail to treat user-supplied content as potentially malicious.
The group primarily targeted holiday rentals, ran BEC scams and peddled second-hand cars and electronic devices.
The sanctions primarily target entities operating within the financial services and technology domains.
Since at least 2010, the group has targeted a wide range of individuals and organizations.
The attack targets constant-time cryptographic implementations, allowing malicious actors to capture sensitive data from the CPU cache.
The threat actor distributed a malicious dependency hosted on a fake Python infrastructure.
The StrelaStealer malware steals email login data from email clients.
This marks the first time APT29 has been observed targeting political parties.
Showing elements 1401 - 1410