Common Information
Type Value
Value
Ⲭⲏⲙⲓ
Category Target
Type Target-Information
Misp Type Cluster
Description None
Details Published Attributes CTI Title
Details Website 2022-11-09 0 Egypt’s COP27 summit app is a cyber weapon, experts warn
Details Website 2022-11-07 3 Disclosure as zero-day prep. Election security. Hacktivism and satcom in the hybrid war.
Details Website 2022-11-07 0 Closing the Climate Data Divide in the Global South - Microsoft On the Issues
Details Website 2022-11-07 0 Indian hackers illegally earn thousands of dollars working for private investigators worldwide: Report - Times of India
Details Website 2022-11-02 26 Avast Q3/2022 Threat Report - Avast Threat Labs
Details Website 2022-10-28 6 Enterprise Cyber Security Market 2022 : Production Capacity, Restring Drivers, Size and Landscape Outlook 2028 | 91 Pages Report - Digital Journal
Details Website 2022-10-14 4 Who is Xi Jinping, the world’s most powerful politician?
Details Website 2022-10-12 76 Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike
Details Website 2022-10-12 77 Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike
Details Website 2022-10-06 7 Middle East Cybersecurity Market worth $44.7 billion by 2027 – Report by MarketsandMarkets™
Details Website 2022-10-06 1 The Week in Security: CISA alerts on open source tool, SBOMs are just the 'first step'
Details Website 2022-10-03 36 DeftTorero TTPs in 2019–2021
Details Website 2022-09-29 16 Dark Web Profile: Overthinker1877 - SOCRadar
Details Website 2022-09-28 0 1 Key for 1 Lock: The Chinese Communist Party’s Strategy for Targeted Propaganda
Details Website 2022-09-27 0 New NullMixer Malware Campaign Stealing Users' Payment Data and Credentials
Details Website 2022-09-27 0 Cyber Attack news headlines trending on Google - Cybersecurity Insiders
Details Website 2022-09-26 197 NullMixer drops Redline Stealer, SmokeLoader and other malware
Details Website 2022-09-13 6 Hacking Team - Wikipedia
Details Website 2022-09-07 0 Yeshiva University cybersecurity program rockets up in national rankings
Details Website 2022-09-02 3 Shamoon - Wikipedia
Details Website 2022-08-31 28 Analysis of APT35 Infrastructure Reveals Interest in Egyptian…
Details Website 2022-08-21 3 Resecurity | Escanor Malware delivered in Weaponized Microsoft Office Documents
Details Website 2022-08-18 0 Ukraine war spotlights agriculture sector's vulnerability to cyber attack
Details Website 2022-08-15 9 IT threat evolution in Q2 2022. Mobile statistics
Details Website 2022-08-15 29 Non-mobile malware statistics, Q2 2022