enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Advanced persistent threat - Wikipedia

    en.wikipedia.org/wiki/Advanced_persistent_threat

    An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. [1] [2] In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific ...

  3. Charming Kitten - Wikipedia

    en.wikipedia.org/wiki/Charming_Kitten

    Charming Kitten, also called APT35 (by Mandiant), Phosphorus or Mint Sandstorm (by Microsoft), [1] Ajax Security (by FireEye), [2] and NewsBeef (by Kaspersky [3] [4]), is an Iranian government cyberwarfare group, described by several companies and government officials as an advanced persistent threat.

  4. Factbox-APT31: the Chinese hacking group behind global ... - AOL

    www.aol.com/news/factbox-apt31-chinese-hacking...

    Advanced Persistent Threat Group 31 (APT31) is a collective of Chinese state-sponsored intelligence officers, contract hackers and attendant staff that engage in hacking activities and "malicious ...

  5. APT40 - Wikipedia

    en.wikipedia.org/wiki/APT40

    APT40, also known as BRONZE MOHAWK (by Secureworks), [1] FEVERDREAM, G0065, GADOLINIUM (formerly by Microsoft), [2] Gingham Typhoon [3] (by Microsoft), GreenCrash, Hellsing (by Kaspersky), [4] Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint), [5] MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper, is an advanced persistent threat operated by the Hainan State Security Department, a ...

  6. Gamaredon - Wikipedia

    en.wikipedia.org/wiki/Gamaredon

    Gamaredon, also known as Primitive Bear, UNC530, ACTINIUM, or Aqua Blizzard [1] (by Microsoft) is a Russian advanced persistent threat that has been active since at least 2013. [ 2 ] [ 3 ] Motivation

  7. Elfin Team - Wikipedia

    en.wikipedia.org/wiki/Elfin_Team

    Advanced Persistent Threat 33 (APT33) is a hacker group identified by FireEye as being supported by the government of Iran. [ 1 ] [ 2 ] The group has also been called Elfin Team , Refined Kitten (by Crowdstrike ), Magnallium (by Dragos), Peach Sandstorm , [ 3 ] and Holmium (by Microsoft ).

  8. Hafnium (group) - Wikipedia

    en.wikipedia.org/wiki/HAFNIUM_(group)

    Hafnium (sometimes styled HAFNIUM; also called Silk Typhoon by Microsoft [1]) is a cyber espionage group, sometimes known as an advanced persistent threat, with alleged ties to the Chinese government. [2] [3] [4] Hafnium is closely connected to APT40. [5]

  9. Helix Kitten - Wikipedia

    en.wikipedia.org/wiki/Helix_Kitten

    It has targeted many of the same organizations as Advanced Persistent Threat 33, according to John Hultquist. [3] In April 2019, APT34's cyber-espionage tools' source code was leaked through Telegram. [5] [6]