Common Information
Type | Value |
---|---|
Value |
Equation - G0020 |
Category | Actor |
Type | Mitre-Intrusion-Set |
Misp Type | Cluster |
Description | [Equation](https://attack.mitre.org/groups/G0020) is a sophisticated threat group that employs multiple remote access tools. The group is known to use zero-day exploits and has developed the capability to overwrite the firmware of hard disk drives. (Citation: Kaspersky Equation QA) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 0 | Why the human element is so important | #schoolsaftey #kids #parents #children | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 0 | What you need to know about the WannaCry Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-13 | 0 | The Hidden Reason Why You Need to Install the Burp Certificate First | ||
Details | Website | 2024-11-13 | 0 | In Wake of Ransomware Attack, City Seeks to Separate IT Services from County | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-13 | 0 | Maximise Crypto Mining Profitability: Strategies For Success In 2023 | ||
Details | Website | 2024-11-12 | 19 | New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia - CyberSRC | ||
Details | Website | 2024-11-12 | 0 | The Growing Threat of Ransomware in 2024: What You Need to Know - Cybersecurity Insiders | ||
Details | Website | 2024-11-11 | 0 | Cybersecurity In Wealth Management | ||
Details | Website | 2024-11-11 | 1 | Online Sale For Secure VPN | ||
Details | Website | 2024-11-09 | 0 | Surveillance vs. Privacy — Balancing Security and Freedom in Cybersecurity | ||
Details | Website | 2024-11-07 | 0 | Staying Ahead of Cyber Threats: The Importance of Continuous Learning in Digital Forensics | ||
Details | Website | 2024-11-07 | 0 | From Technocrat to Business Leader: The CISO’s Strategic Transformation | ||
Details | Website | 2024-11-07 | 6 | Context Is King: From Vulnerability Management to Exposure Management | ||
Details | Website | 2024-11-07 | 0 | The Essential Guide to Cybersecurity: From Identity and Access Management to Threat Detection | ||
Details | Website | 2024-11-07 | 0 | Technicity Kaleidoscope — 110624 | ||
Details | Website | 2024-11-07 | 8 | Category | ||
Details | Website | 2024-11-06 | 3 | Today’s Top Cyber Intelligence Highlights — Nov 06, 2024 | ||
Details | Website | 2024-11-04 | 49 | A Formal Report Writing On Cyber Crime And Digital Investigation. | ||
Details | Website | 2024-11-02 | 0 | New Password Hack Attack—Chrome, Facebook, Netflix, PayPal Users At Risk | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-02 | 0 | Unknown World of Aliens: The Possibility of Intergalactic Life Exists | ||
Details | Website | 2024-10-30 | 2 | Jonathan Morales on LinkedIn: The Machines are here…. | ||
Details | Website | 2024-10-30 | 0 | HAWK Is The Last Lattice Method Standing for Additional PQC Signatures | ||
Details | Website | 2024-10-28 | 0 | Intro to Risk Management | ||
Details | Website | 2024-10-28 | 0 | Cryptography Basics | Tryhackme Write Up | By jawstar | ||
Details | Website | 2024-10-28 | 0 | Implementation of a novel secured authentication protocol for cyber security applications | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting |