Common Information
Type Value
Value
about.fb.com
Category
Type Domain
Misp Type
Description
Details Published Attributes CTI Title
Details Pdf 2024-08-09 471 BayLfV_Vollanalyse_Doppelgaenger
Details Pdf 2024-08-06 15 Iran steps into US election 2024 with cyber-enabled influence operations
Details Website 2024-07-25 835 Mid-year Doppelgänger information operations in Europe and the US
Details Pdf 2024-06-07 100 Deutschland im Fokus der pro-russischen Desinformationskampagne "Doppelgänger"
Details Pdf 2024-05-13 71 Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society
Details Pdf 2024-02-22 238 Doppelgänger NG Cyberwarfare campaign
Details Pdf 2023-12-06 57 Microsoft Security Compliance and Identity
Details Pdf 2023-12-05 131 Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics
Details Pdf 2023-10-18 1172 ENISA THREAT LANDSCAPE 2023
Details Website 2023-07-10 9 Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back
Details Website 2023-05-09 4 Meta says ChatGPT-related malware is on the rise
Details Website 2023-01-21 3 Two Factor Authentication Bypass On Facebook
Details Pdf 2023-01-13 89 サイバー脅威の 実態
Details Website 2022-11-25 9 Security Navigator 2023 shows Cyber Extortion dominates landscape as 40% is malware
Details Pdf 2022-11-03 248 ENISA THREAT LANDSCAPE 2022
Details Pdf 2022-10-26 228 National cyber threat assessment 2023–2024
Details Website 2022-10-08 2 Removing Coordinated Inauthentic Behavior From China and Russia - Correct Success
Details Pdf 2022-05-17 89 The Diamond Model for Influence Operations Analysis
Details Pdf 2022-04-27 248 Cyber Threats 2021: A Year in Retrospect
Details Pdf 2022-01-25 121 VERSO UN NUOVO SLANCI
Details Pdf 2021-12-20 119 PREVISÕES DE TREND MICRO SECURITY PARA 2022
Details Pdf 2021-12-03 121 TREND MICRO SECURITY PREDICTIONS FOR 2022
Details Pdf 2021-10-15 181 RESEARCH REPORT
Details Pdf 2021-01-14 25 Turning the Tide
Details Pdf 2020-12-15 26 Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends