enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Advanced persistent threat - Wikipedia

    en.wikipedia.org/wiki/Advanced_persistent_threat

    Threat – APTs are a threat because they have both capability and intent. APT attacks are executed by coordinated human actions, rather than by mindless and automated pieces of code. The operators have a specific objective and are skilled, motivated, organized and well funded. Actors are not limited to state sponsored groups. [3] [10]

  3. Double Dragon (hacking group) - Wikipedia

    en.wikipedia.org/wiki/Double_Dragon_(hacking_group)

    Double Dragon [a] is a hacker group with alleged ties to the Chinese Ministry of State Security (MSS). [4] Classified as an advanced persistent threat, the organization was named by the United States Department of Justice in September 2020 in relation to charges brought against five Chinese and two Malaysian nationals for allegedly compromising more than 100 companies around the world.

  4. Charming Kitten - Wikipedia

    en.wikipedia.org/wiki/Charming_Kitten

    Charming Kitten, also called APT35 (by Mandiant), Phosphorus or Mint Sandstorm (by Microsoft), [1] Ajax Security (by FireEye), [2] and NewsBeef (by Kaspersky [3] [4]), is an Iranian government cyberwarfare group, described by several companies and government officials as an advanced persistent threat.

  5. Red Apollo - Wikipedia

    en.wikipedia.org/wiki/Red_Apollo

    Red Apollo (also known as APT 10 by Mandiant, MenuPass by Fireeye, Stone Panda by Crowdstrike, and POTASSIUM by Microsoft) [1] [2] is a Chinese state-sponsored cyberespionage group which has operated since 2006.

  6. Cozy Bear - Wikipedia

    en.wikipedia.org/wiki/Cozy_Bear

    Cozy Bear is a Russian advanced persistent threat hacker group believed to be associated with Russian foreign intelligence by United States intelligence agencies and those of allied countries.

  7. Helix Kitten - Wikipedia

    en.wikipedia.org/wiki/Helix_Kitten

    Helix Kitten (also known as APT34 by FireEye, OILRIG, Crambus, Cobalt Gypsy, Hazel Sandstorm, [1] or EUROPIUM) [2] is a hacker group identified by CrowdStrike as Iranian. [ 3 ] [ 4 ] History

  8. Elfin Team - Wikipedia

    en.wikipedia.org/wiki/Elfin_Team

    Advanced Persistent Threat 33 (APT33) is a hacker group identified by FireEye as being supported by the government of Iran. [ 1 ] [ 2 ] The group has also been called Elfin Team , Refined Kitten (by Crowdstrike ), Magnallium (by Dragos), Peach Sandstorm , [ 3 ] and Holmium (by Microsoft ).

  9. PLA Unit 61398 - Wikipedia

    en.wikipedia.org/wiki/PLA_Unit_61398

    A report by the computer security firm Mandiant stated that PLA Unit 61398 is believed to operate under the 2nd Bureau of the People's Liberation Army General Staff Department (GSD) Third Department (总参三部二局) [1] and that there is evidence that it contains, or is itself, an entity Mandiant calls APT1, part of the advanced persistent threat that has attacked a broad range of ...