31.12.19 | Microsoft sued North Korea-linked Thallium group | APT | Securityaffairs |
26.12.19 | How Organizations Can Defend Against Advanced Persistent Threats | APT | Thehackernews |
24.12.19 | Op Wocao – China-linked APT20 was able to bypass 2FA | APT | Securityaffairs |
20.12.19 | Chinese Rancor APT Refreshes Malware Kit for Espionage Attacks | APT | Bleepingcomputer |
20.12.19 | Lazarus Hackers Target Linux, Windows With New Dacls Malware | APT Virus | Bleepingcomputer |
18.12.19 | Gangnam Industrial Style APT campaign targets industrial firms worldwide | APT | Securityaffairs |
17.12.19 | OilRig’s Poison Frog – old samples, same trick | APT | Securelist |
12.12.19 | Trickbot gang and Lazarus APT, the hidden link behind an epochal phenomena | APT | Securityaffairs |
12.12.19 | Lazarus APT Collaborates with Trickbot’s Anchor Project | APT | Threatpost |
8.12.19 | Vietnam-linked Ocean Lotus hacked BMW and Hyundai networks | APT | Securityaffairs |
7.12.19 | Stealthy MacOS Malware Tied to Lazarus APT | Apple APT | Threatpost |
5.12.19 | The evolutions of APT28 attacks | APT | Securityaffairs |
5.12.19 | Iran-Linked APT groups target energy, industrial sectors with ZeroCleare Wiper | APT | Securityaffairs |
4.12.19 | Iran-Linked ZeroCleare Wiper Targets Energy, Industrial Sectors in Middle East | APT | Securityweek |
4.12.19 | APT review: what the world’s threat actors got up to in 2019 | APT | Securelist |
28.11.19 | RevengeHotels: cybercrime targeting hotel front desks worldwide | APT | Securelist |
21.11.19 | Ransomware Gangs Adopt APT Tactics in Targeted Attacks | APT Ransomware | Bleepingcomputer |
15.11.19 | | APT | Threatpost |
14.11.19 | Tracking Iran-linked APT33 group via its own VPN networks | APT | Securityaffairs |
11.11.19 | Platinum Cyberspies Use Sophisticated Backdoor in Attacks | APT | Securityweek |
10.11.19 | New Stealthy Backdoor Used by Platinum APT in Recent Attacks | APT | Bleepingcomputer |
10.11.19 | The Platinum APT group adds the Titanium backdoor to its arsenal | APT | Securityaffairs |
9.11.19 | Platinum APT Shines Up New Titanium Backdoor | APT | Threatpost |
8.11.19 | Titanium: the Platinum group strikes again | APT | Securelist |
7.11.19 | DarkUniverse APT Stayed Hidden for 8 Years, Updated Regularly | APT | Bleepingcomputer |
7.11.19 | DarkUniverse APT Emerges to Deliver Sophisticated, Targeted Spy Attacks | APT | Threatpost |
6.11.19 | Anonymous and LulzSecITA hacked professional orders and telephone operator Lyca Mobile | APT | Securityaffairs |
6.11.19 | Mysterious DarkUniverse APT remained undetected for 8 years | APT | Securityaffairs |
6.11.19 | DarkUniverse APT Uses Just-in-Time Malware Creation | APT | Securityweek |
5.11.19 | DarkUniverse – the mysterious APT framework #27 | APT | Securelist |
1.11.19 | | APT | Threatpost |
31.10.19 | China-linked APT41 group targets telecommunications companies with new backdoor | APT | Securityaffairs |
30.10.19 | | APT | Threatpost |
29.10.19 | | APT | Threatpost |
29.10.19 | Fancy Bear continues to target sporting and anti-doping organizations | APT | Securityaffairs |
25.10.19 | Experts attribute NukeSped RAT to North Korea-Linked hackers | APT Virus | Securityaffairs |
23.10.19 | Experts believe the Magecart Group 5 could be linked to the Carbanak APT | APT | Securityaffairs |
22.10.19 | Turla Compromises, Infiltrates Iranian APT Infrastructure | APT | Threatpost |
21.10.19 | UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers | APT BigBrothers | Securityaffairs |
19.10.19 | Cozy Bear Russian Hackers Spotted After Staying Undetected for Years | APT | Bleepingcomputer |
16.10.19 | APT trends report Q3 2019 | APT | Securelist |
10.10.19 | Multiple APT groups are exploiting VPN vulnerabilities, NSA warns | APT | Securityaffairs |
9.10.19 | | APT | Threatpost |
8.10.19 | | APT BigBrothers | Threatpost |
7.10.19 | Iranian Hackers Said to Target Presidential Campaign | APT BigBrothers | Securityweek |
6.10.19 | Iran-linked Phosphorus group hit a 2020 presidential campaign | APT | Securityaffairs |
6.10.19 | UK NCSC agency warns of APTs exploiting Enterprise VPN vulnerabilities | APT BigBrothers | Securityaffairs |
5.10.19 | APTs Exploiting Enterprise VPN Vulnerabilities, UK Govt Warns | APT BigBrothers Vulnerebility | Securityweek |
4.10.19 | Cyber-Spy Group Active Since 2013 Now Tied to Chinese State Actor | APT CyberSpy | Bleepingcomputer |
4.10.19 | 6 cyber-espionage campaigns since 2013 attributed to PKPLUG China-linked group | APT CyberSpy | Securityaffairs |
26.9.19 | Study shows connections between 2000 malware samples used by Russian APT groups | APT | Securityaffairs |
24.9.19 | APT or not APT? What’s Behind the Aggah Campaign | APT | Securityaffairs |
24.9.19 | Russian APT Map Reveals 22,000 Connections Between 2000 Malware Samples | APT | Thehackernews |
14.9.19 | | APT Phishing | Threatpost |
14.9.19 | The US Treasury placed sanctions on North Korea linked APT Groups | APT | Securityaffairs |
9.9.19 | Symantec uncovered the link between China-Linked Thrip and Billbug groups | APT | Securityaffairs |
9.9.19 | China-Linked 'Thrip' Cyberspies Continue Attacks on Southeast Asia | APT | Securityweek |
9.9.19 | China-linked APT3 was able to modify stolen NSA cyberweapons | APT | Securityaffairs |
6.9.19 | | APT | Threatpost |
28.8.19 | Lyceum APT made the headlines with attacks in Middle East | APT | Securityaffairs |
22.8.19 | China-linked APT41 group targets US-Based Research University | APT | Securityaffairs |
22.8.19 | Russian APT 'Silence' Steals $3.5 Million in One Year | APT | Securityweek |
21.8.19 | Damage from Silence APT operations increases fivefold. The gang deploys new tools on its “worldwide tour” | APT | Securityaffairs |
12.8.19 | Recent Cloud Atlas activity | APT | Securelist |
7.8.19 | OilRig APT group: the evolution of attack techniques over time | APT | Securityaffairs |
6.8.19 | Russian APT Abuses IoT Devices to Infiltrate Corporate Targets | APT | Bleepingcomputer |
6.8.19 | The Evolution of Aggah: From Roma225 to the RG Campaign | APT | Securityaffairs |
6.8.19 | Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks | APT | Securityaffairs |
3.8.19 | | APT BigBrothers | Threatpost |
1.8.19 | APT trends report Q2 2019 | Analysis APT | Securelist |
24.7.19 | China-Linked APT15 group is using a previously undocumented backdoor | APT | Securityaffairs |
23.7.19 | China-Linked Threat Actor Using New Backdoor | APT | Securityweek |
22.7.19 | New APT34 campaign uses LinkedIn to deliver fresh malware | APT | Securityaffairs |
20.7.19 | Iran-Linked APT34 Invites Victims to LinkedIn for Fresh Malware Infections | APT | Threatpost |
19.7.19 | Ke3chang APT Linked to Previously Undocumented Backdoor | APT | Threatpost |
17.7.19 | | APT Virus | Threatpost |
17.7.19 | Turla APT group adds Topinambour Trojan to its arsenal | APT | Securityaffairs |
16.7.19 | Bulgaria Probes Russia-Linked Leak of Taxpayer Data | APT | Securityweek |
16.7.19 | Russia-linked Hackers Use New Trojans in Recent Attacks | APT | Securityweek |
16.7.19 | | APT | Threatpost |
15.7.19 | Turla renews its arsenal with Topinambour | APT | Securelist |
5.7.19 | Outlook Flaw Exploited by Iranian APT33, US CyberCom Issues Alert | APT | Bleepingcomputer |
5.7.19 | ‘Twas the night before | APT | Securelist |
4.7.19 | Bangladesh Cyber Heist 2.0: Silence APT goes global | APT | Securityaffairs |
2.7.19 | OceanLotus APT Uses New Ratsnif Trojan for Network Attacks | APT | Bleepingcomputer |
1.7.19 | Iran-linked APT33 updates infrastructure following its public disclosure | APT | Securityaffairs |
27.6.19 | | APT | Threatpost |
27.6.19 | Similarities and differences between MuddyWater and APT34 | APT | Securityaffairs |
26.6.19 | Platinum is back | APT | Securelist |
25.6.19 | Zebrocy’s Multilanguage Malware Salad | APT | Securelist |
22.6.19 | Turla Espionage Group Hacks OilRig APT Infrastructure | APT | Bleepingcomputer |
21.6.19 | Russia-Linked Turla APT group Hijacked C2 of the Iranian OilRig | APT | Securityaffairs |
20.6.19 | Russia-Linked Hackers Hijack Infrastructure of Iranian Threat Group | APT | Securityweek |
13.6.19 | MuddyWater Updates POWERSTATS Backdoor For Multi-Stage Attacks | APT | Bleepingcomputer |
11.6.19 | MuddyWater APT group updated its multi-stage PowerShell backdoor Powerstats | APT | Securityaffairs |
10.6.19 | Hunting the ICEFOG APT group after years of silence | APT | Securityaffairs |
9.6.19 | The MuddyWater APT Group Adds New Tools to Their Arsenal | APT | Bleepingcomputer |
8.6.19 | Hunting the ICEFOG APT group after years of silence | APT | Securityaffairs |
6.6.19 | Platinum APT and leverages steganography to hide C2 communications | APT | Securityaffairs |
6.6.19 | Analyzing the APT34’s Jason project | APT | Securityaffairs |
5.6.19 | | APT | Threatpost |
3.6.19 | ESET analyzes Turla APT’s usage of weaponized PowerShell | APT | Securityaffairs |
1.6.19 | Researchers Dissect PowerShell Scripts Used by Russia-Linked Hackers | APT | Securityweek |
31.5.19 | Emissary Panda APT group hit Government Organizations in the Middle East | APT | Securityaffairs |
29.5.19 | New APT10 Activity Detected in Southeast Asia | APT | Securityweek |
28.5.19 | APT10 is back with two new loaders and new versions of known payloads | APT | Securityaffairs |
21.5.19 | MuddyWater Hacking Group Upgrades Arsenal to Avoid Detection | APT | Bleepingcomputer |
21.5.19 | MuddyWater BlackWater campaign used new anti-detection techniques | APT | Securityaffairs |
14.5.19 | North Korea-linked ScarCruft APT adds Bluetooth Harvester to its arsenal | APT | Securityaffairs |
14.5.19 | North Korea-Linked 'ScarCruft' Adds Bluetooth Harvester to Toolkit | APT | Securityweek |
14.5.19 | | APT | Threatpost |
9.5.19 | FIN7.5: the infamous cybercrime rig “FIN7” continues its activities | APT | Securelist |
9.5.19 | TURLA LIGHTNEURON | APT | Report |
8.5.19 | LulZSec and Anonymous Ita hackers published sensitive data from 30,000 Roman lawyers | APT | Securityaffairs |
8.5.19 | LightNeuron, a Turla’s backdoor used to compromise exchange mail servers | APT | Securityaffairs |
7.5.19 | Buckeye APT group used Equation Group tools prior to ShadowBrokers leak | APT | Securityaffairs |
7.5.19 | Turla Uses Sophisticated Backdoor to Hijack Exchange Mail Servers | APT | Securityweek |
7.5.19 | Turla Backdoor Deployed in Attacks Against Worldwide Targets | APT | Bleepingcomputer |
3.5.19 | APT34: Glimpse project | APT | Securityaffairs |
2.5.19 | APT trends report Q1 2019 | APT | Securelist |
30.4.19 | know what you did last summer, MuddyWater blending in the crowd | APT | Securelist |
30.4.19 | MuddyWater APT Hones an Arsenal of Custom Tools | APT | Threatpost |
24.4.19 | OilRig APT uses Karkoff malware along with DNSpionage in recent attacks | APT | Securityaffairs |
24.4.19 | Vietnam-Linked Hackers Use Atypical Executables to Avoid Detection | APT | Securityweek |
22.4.19 | Ride-Hailing Company operating in Iran exposes data of Iranian Drivers | APT | Securityaffairs |
22.4.19 | Source Code of Iran-Linked Hacking Tools Posted Online | APT | Securityweek |
20.4.19 | Source code of tools used by OilRig APT leaked on Telegram | APT | Securityaffairs |
19.4.19 | Hacker Group Exposes Iranian APT Operations and Members | APT | Bleepingcomputer |
19.4.19 | APT28 and Upcoming Elections: evidence of possible interference (Part II) | APT | Securityaffairs |
18.4.19 | Russian TA505 threat actor target financial entities worldwide | APT | Securityaffairs |
12.4.19 | APT28 and Upcoming Elections: evidence of possible interference | APT | Securityaffairs |
12.4.19 | | APT | Threatpost |
12.4.19 | FBI/DHS MAR report details HOPLIGHT Trojan used by Hidden Cobra APT | APT | Securityaffairs |
12.4.19 | Hamas-Linked Threat Actor's Infrastructure Disrupted | APT | Securityweek |
11.4.19 | TajMahal APT Can Steal Data From CDs, Printer Queues | APT | Securityweek |
10.4.19 | Sophisticated TajMahal APT Framework remained under the radar for 5 years | APT | Securityaffairs |
10.4.19 | Sophisticated 'TajMahal APT Framework' Remained Undetected for 5 Years | APT | Thehackernews |
10.4.19 | Gaza Cybergang Group1, operation SneakyPastes | APT | Securelist |
10.4.19 | Project TajMahal – a sophisticated new APT framework | APT | Securelist |
4.4.19 | | APT | Threatpost |
4.4.19 | OceanLotus APT group leverages a steganography-based loader to deliver backdoors | APT | Securityaffairs |
3.4.19 | OceanLotus APT Uses Steganography to Load Backdoors | APT | Bleepingcomputer |
31.3.19 | Microsoft took control of 99 domains used by Iran-linked Phosphorus APT | APT | Securityaffairs |
29.3.19 | | APT | Threatpost |
28.3.19 | Lazarus APT continues to target cryptocurrency businesses with Mac malware | APT | Securityaffairs |
28.3.19 | Microsoft Retaliates Against APT35 Hacker Group by Seizing 99 Domains | APT | Bleepingcomputer |
27.3.19 | Iran-Linked Cyberspy Group APT33 Continues Attacks on Saudi Arabia, U.S. | APT | Securityweek |
27.3.19 | ASUS Admits Its Live Update Utility Was Backdoored by APT Group | APT | Bleepingcomputer |
26.3.19 | | APT | Threatpost |
26.3.19 | Operation ShadowHammer | APT | Securelist |
26.3.19 | Free Tools: spotting APTs through Malware streams | APT | Securityaffairs |
23.3.19 | Russian APT groups target European governments ahead of May Elections | APT | Securityaffairs |
16.3.19 | Recently Patched WinRAR Flaw Exploited in APT Attacks | APT | Securityweek |
14.3.19 | CVE-2019-0797 Windows Zero-Day exploited by FruityArmor and SandCat APT Groups | APT | Securityaffairs |
12.3.19 | | APT | Threatpost |
6.3.19 | APT40 cyberespionage group supporting growth of China’s naval sector | APT | Securityaffairs |
6.3.19 | Iran-Linked Chafer APT recently used python-based backdoor | APT | Securityaffairs |
1.3.19 | China's APT27 Hackers Use Array of Tools in Recent Attacks | APT | Securityweek |
27.2.19 | | APT | Threatpost |
21.2.19 | Microsoft says Russian APT28 espionage group hit Democratic Institutions in Europe | APT | Securityaffairs |
21.2.19 | North Korea’s Lazarus APT targets Russian Entities | APT | Securityaffairs |
21.2.19 | Microsoft: Russia’s Fancy Bear Working to Influence EU Elections | APT | Threatpost |
20.2.19 | North Korean APT Lazarus Targets Russian Entities with KEYMARBLE Backdoor | APT | Bleepingcomputer |
20.2.19 | ThreatList: APT Adversaries Up the Ante on Speed, Target Telecom | APT | Threatpost |
20.2.19 | North Korea's Lazarus Hackers Found Targeting Russian Entities | APT | Securityweek |
5.2.19 | | APT | Threatpost |
2.2.19 | | APT | Threatpost |
30.1.19 | Iran-Linked APT39 group use off-the-shelf tools to steal data | APT | Securityaffairs |
30.1.19 | Sofacy’s Zepakab Downloader Spotted In-The-Wild | APT | Securityaffairs |
25.1.19 | "Cobalt" Hackers Use Google App Engine in Recent Attacks | APT | Securityweek |
25.1.19 | Kaspersky links GreyEnergy and Zebrocy activities | APT | Securityaffairs |
24.1.19 | GreyEnergy’s overlap with Zebrocy | APT | Securelist |
22.1.19 | Remote Code Exeution Bug Patched in APT Linux Package Manager | APT | Bleepingcomputer |
22.1.19 | Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems | APT | Thehackernews |
21.1.19 | DarkHydrus Hackers Use Google Drive in Recent Attacks | APT | Securityweek |
20.1.19 | DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan | APT | Bleepingcomputer |
17.1.19 | GreyEnergy: Welcome to 2019 | APT | Securityaffairs |
16.1.19 | Experts link attack on Chilean interbank network Redbanc NK Lazarus APT | APT | Securityaffairs |
14.1.19 | TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal | APT | Securityaffairs |
11.1.19 | Alleged Iran-linked APT groups behind global DNS Hijacking campaign | APT | Securityaffairs |
| | | |