Remove 2009 Remove Analysis Remove Government
article thumbnail

Taiwan Government websites suffered DDoS attacks during the Nancy Pelosi visit

Security Affairs

Taiwan government websites were temporarily forced offline by cyber attacks during the visit to Taipei of US House Speaker Nancy Pelosi. Major Taiwan government websites were temporarily forced offline by distributed denial of service (DDoS) attacks attacks during the visit to Taipei of US House Speaker Nancy Pelosi.

article thumbnail

Kaspersky Analysis Shines Light on DarkUniverse APT Group

Dark Reading

Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaspersky Lab Analysis Shines Light on DarkUniverse APT Group

Dark Reading

Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.

article thumbnail

LookingGlass Cyber Solutions: Threat Intelligence Review

eSecurity Planet

The TIP provides security professionals with accelerated analysis of how threats might impact the organization and how to counter those threats. With roots in the NSA, the four main sectors adopting LookingGlass include defense, energy, financial, and government. Company Description Spun out from the U.S.

article thumbnail

Symantec uncovered the link between China-Linked Thrip and Billbug groups

Security Affairs

” reads the analysis published by Symantec. “Analysis of the latter has revealed close links to another long-established espionage group called Billbug (aka Lotus Blossom ). Billbug is a long-established espionage group, active since at least January 2009. Sagerunex ).” ” concludes the report. “Its

article thumbnail

North Korea-linked Lazarus APT targets the COVID-19 research

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by Kaspersky.

article thumbnail

APT10 is back with two new loaders and new versions of known payloads

Security Affairs

The APT10 group has added two new malware loaders to its arsenal and used in attacks aimed at government and private organizations in Southeast Asia. In April 2019, China-linked cyber-espionage group tracked as APT10 has added two new loaders to its arsenal and used it against government and private organizations in Southeast Asia.