What is hiding behind the Great Firewall of China: The most prolific Chinese APTs (part 1)
Since the early 2000s, China has been competing with the US and its allies over dominance of global cyberspace.
Since the early 2000s, China has been competing with the US and its allies over dominance of global cyberspace.
The group has been active since 2012, and has a long history of offensive operations targeting South Korean think tanks, industry, and nuclear power operators.
This is the fourth part of the series which is dedicated to the Berserk Bear.
The second article in the series is focused on targets and TTPs of Lazarus Group.
The third article in the series which is dedicated to the Voodoo Bear hacking group.
North Korea has developed a number of techniques to evade international sanctions and support its struggling economy.
This is the second part of the series which is dedicated to Cozy Bear (APT 29).
In “The Four Bears” series we will tell you about the APT groups known as Fancy Bear, Cozy Bear, Voodoo Bear, and Berserk Bear.
In 2021 nation-state actors somewhat faded into the background, but they still pose a significant threat.
The attackers exploited the Log4Shell vulnerability on ONUS’ Cyclos server to plant backdoor and exfiltrate data.
Showing elements 2671 - 2680