Dan LounsburySalt Typhoon Part II: A Growing Threat in Cyber-EspionageRecent investigations and updates have shed more light on Salt Typhoon, a sophisticated Chinese state-sponsored hacking group that has been…Dec 3
Gianluca TiepoloSophisticated APT29 Campaign Abuses Notion API to Target the European CommissionResearch by Gianluca TiepoloMar 9, 2023
RocketMe Up CybersecuritySteganography in Cyber Espionage — Hidden Data in Multimedia Files as a Stealth Attack VectorInvisible Attacks: The Role of Steganography in Cyber Warfare.Oct 31Oct 31
MITRE DoggyNorth Korean APT Group : Moonstone SleetMoonstone Sleet, a newly identified North Korean APT group, combines espionage with financial motives through sophisticated cyberattacks…Nov 25Nov 25
RocketMe Up CybersecurityAdvanced Persistent Threats (APTs) — How to Defend Against ThemExploring advanced strategies and techniques to defend against the stealthy and sophisticated nature of Advanced Persistent Threats (APTs).Oct 22Oct 22
Dan LounsburySalt Typhoon Part II: A Growing Threat in Cyber-EspionageRecent investigations and updates have shed more light on Salt Typhoon, a sophisticated Chinese state-sponsored hacking group that has been…Dec 3
Gianluca TiepoloSophisticated APT29 Campaign Abuses Notion API to Target the European CommissionResearch by Gianluca TiepoloMar 9, 2023
RocketMe Up CybersecuritySteganography in Cyber Espionage — Hidden Data in Multimedia Files as a Stealth Attack VectorInvisible Attacks: The Role of Steganography in Cyber Warfare.Oct 31
MITRE DoggyNorth Korean APT Group : Moonstone SleetMoonstone Sleet, a newly identified North Korean APT group, combines espionage with financial motives through sophisticated cyberattacks…Nov 25
RocketMe Up CybersecurityAdvanced Persistent Threats (APTs) — How to Defend Against ThemExploring advanced strategies and techniques to defend against the stealthy and sophisticated nature of Advanced Persistent Threats (APTs).Oct 22
User LinuxResearchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese HackersA suspected Chinese threat actor targeted a large U.S. organization earlier this year as part of a four-month-long intrusion.Dec 7