サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
コーヒー沼
www.cybereason.com
DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos Following the discovery of Hafnium attacks targeting Microsoft Exchange vulnerabilities, the Cybereason Nocturnus and Incident Response teams proactively hunted for various threat actors trying to leverage similar techniques in-the-wild. In the beginning of 2021, the Cybereason Nocturnus Team investigated clusters of intrusions dete
Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers Research by: Mor Levi, Assaf Dahan, and Amit Serper EXECUTIVE SUMMARY In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers carried out by a threat actor using tools and techniques commonly associated with Chinese-affiliated threat actors, such as
Research by: Assaf Dahan The Ursnif trojan (also known as Gozi ISFB) is one of the most prolific information stealing Trojans in the cybercrime landscape. Since its reappearance in early 2013, it has been constantly evolving. In 2015, its source code was leaked and made publicly available on Github, which led to further development of the code by different threat actors who improved it and added n
Night of the Devil: Ransomware or wiper? A look into targeted attacks in Japan using MBR-ONI For several months Cybereason has been following the concerning rise of ONI, a family of ransomware involved in targeted attacks against Japanese companies. We suspect that the ONI ransomware was used as a wiper to cover up an elaborate hacking operation. These targeted attacks lasted between three to nine
Experiencing a breach? Cybereason Incident Response will detect and fully remediate all instances of an attack, getting you back to business fast. Speak with a Defender now
このページを最初にブックマークしてみませんか?
『Cybersecurity Software | Cybereason』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く