Common Information
Type | Value |
---|---|
Value |
Equation - G0020 |
Category | Actor |
Type | Mitre-Intrusion-Set |
Misp Type | Cluster |
Description | [Equation](https://attack.mitre.org/groups/G0020) is a sophisticated threat group that employs multiple remote access tools. The group is known to use zero-day exploits and has developed the capability to overwrite the firmware of hard disk drives. (Citation: Kaspersky Equation QA) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-28 | 3 | Why Early-Stage Startups Need to Be Compliant to Attract Investors | ||
Details | Website | 2024-10-27 | 0 | The Untapped Potential Of Women In Cybersecurity | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-25 | 4 | Efficient Verification Of Gmail Emails For Security | ||
Details | Website | 2024-10-25 | 3 | Road Toward a Fully Explainable Fraud Detection Scoring Engine | ||
Details | Website | 2024-10-25 | 0 | Dynamic vs Fixed Weights: Building a Scalable Fraud Detection Engine | ||
Details | Website | 2024-10-25 | 1 | Digital Privacy Management For Everyday Users | ||
Details | Website | 2024-10-24 | 0 | How the ransomware attack at Change Healthcare went down: A timeline | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-24 | 2 | 5 Security Considerations for Managing AI Agents and Their Identities | ||
Details | Website | 2024-10-22 | 33 | From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25 | ||
Details | Website | 2024-10-22 | 0 | The Moment I Stopped Confusing Security with Imprisonment | ||
Details | Website | 2024-10-21 | 0 | Interview: Crick Institute’s CIO on a new paradigm for research data management | ||
Details | Website | 2024-10-21 | 0 | Human Error: The Silent Culprit Behind Most Cyberattacks - CloudSEK News | ||
Details | Website | 2024-10-19 | 10 | ASCWG Reverse Engineering challenges | ||
Details | Website | 2024-10-18 | 2 | Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach – Krebs on Security | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | ||
Details | Website | 2024-10-18 | 2 | Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach | ||
Details | Website | 2024-10-18 | 0 | Vulnerability Density and Time-to-Remediate: A Tale of Two Metrics (CTEM) | ||
Details | Website | 2024-10-18 | 2 | Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach – Krebs on Security | ||
Details | Website | 2024-10-17 | 4 | Ensuring Gmail Authentication With Proper Verification | ||
Details | Website | 2024-10-17 | 0 | How to Implement Microsoft Security Products for Maximum Value | ||
Details | Website | 2024-10-17 | 0 | Bitdefender Cyber-Formulas | ||
Details | Website | 2024-10-15 | 898 | US-CERT Vulnerability Summary for the Week of October 7, 2024 - RedPacket Security | ||
Details | Website | 2024-10-15 | 9 | Let’s Clone a Cloner - Part 2: You Have No Power Here | ||
Details | Website | 2024-10-14 | 0 | 3 ways to maximize the ROI on your generative AI strategy | ||
Details | Website | 2024-10-12 | 5 | RSA and Wiener’s Attack | ||
Details | Website | 2024-10-12 | 1 | Advanced VPN And Its Impact On Digital Transformation |