UNKNOWN
Image Description
Common Information
Type Value
UUID 59a5701a-8282-46d2-8329-e323813bb5c3
Fingerprint a0f1d8d3fdc63a856fc99a24b92b470ba1788fe09229dee83f5eee7cc4ac0093
Analysis status DONE
Considered CTI value 0
Text language
Published Jan. 22, 2019, 4:16 p.m.
Added to db April 14, 2024, 10:35 a.m.
Last updated Aug. 30, 2024, 10:47 p.m.
Headline UNKNOWN
Title UNKNOWN
Detected Hints/Tags/Attributes 104/3/73
Attributes
Details Type #Events CTI Value
Details Domain 14
gs.statcounter.com
Details Domain 3
www.today.com
Details Domain 2
news.gallup.com
Details Domain 2
www.polycom.com
Details Domain 20
www.idc.com
Details Domain 177
blog.trendmicro.com
Details Domain 133
www.infosecurity-magazine.com
Details Domain 30
fortune.com
Details Domain 175
www.zdnet.com
Details Domain 604
www.trendmicro.com
Details Domain 18
www.telegraph.co.uk
Details Domain 177
www.wired.com
Details Domain 360
attack.mitre.org
Details Domain 34
www.enisa.europa.eu
Details Domain 62
www.zerodayinitiative.com
Details Domain 28
forbes.com
Details Domain 29
www.cvedetails.com
Details Domain 202
krebsonsecurity.com
Details Domain 247
www.virusbulletin.com
Details Domain 37
www.cnbc.com
Details Domain 8
www.marketwatch.com
Details File 2
the-cost-of-credential-stuffing-asia-pacific.pdf
Details File 2
advice-a8337016.html
Details File 2
report_gen_1216_web_final_rj.pdf
Details File 2
changing-needs-of-the-workplace-whitepaper-enus.pdf
Details File 10
getdoc.jsp
Details File 384
www.inf
Details File 2
kubernetes-kubernetes.html
Details File 2
google-nest-senior-living-aging.html
Details File 252
www.cs
Details File 2
research-suggests-cybersecurity-skills-shortage-is-getting-worse.html
Details Url 2
http://gs.statcounter.com/os-market-share/all/worldwide/2013.
Details Url 3
http://gs.statcounter.com/os-market-share.
Details Url 1
https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin.
Details Url 1
https://www.akamai.com/us/en/multimedia/documents/white-paper/the-cost-of-credential-stuffing-asia-pacific.pdf
Details Url 1
https://www.today.com/parents/how-online-sextortion-drove-one-young-man-suicide-t122735
Details Url 2
https://www.independent.co.uk/news/uk/crime/blackmail-online-sextortion-suicides-videos-photos-sexual-police-
Details Url 2
https://www.greenocktelegraph.co.uk/news/17204102.inverclyde
Details Url 2
https://news.gallup.com/file/reports/199961/soaw_
Details Url 2
http://www.polycom.com/content/dam/polycom
Details Url 2
https://www.idc.com/getdoc.jsp?containerid=prus44361618
Details Url 2
https://blog.trendmicro.com/trendlabs-security-intelligence/iot-devices-need-better-builtin-security/.
Details Url 2
https://blog.trendmicro.com/what-hipaa-and-other-compliance-teaches-us-about-the-reality-of-gdpr/.
Details Url 2
https://www.infosecurity-magazine.com/news/ico-swamped-with-gdpr-breach/.
Details Url 2
http://fortune.com/2018/12/04/targeted-email-fraud/.
Details Url 2
https://www.zdnet.com/article/automation-will-become-central-to-business-strategy-and-operations/.
Details Url 2
https://blog.trendmicro.com/trendlabs-security-intelligence/digital-extortion-forward-looking-view/.
Details Url 2
https://carnegieeurope.eu/2018/06/27/europe-up-for-grabs-looming-battle-lines-of-2019-european-parliament-
Details Url 2
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fake-news-
Details Url 2
https://www.telegraph.co.uk/news/2018/09/20/government-draws-plans-social-media-regulator-following-
Details Url 2
https://arstechnica.com/information-technology/2016/11/adobe-voco-photoshop-for-audio-speech-editing/.
Details Url 2
https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/.
Details Url 3
https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
Details Url 2
https://www.theverge.com/2018/9/28/17874768/california-iot-smart-device-cybersecurity-bill-sb-327-signed-law.
Details Url 2
https://blog.trendmicro.com/trendlabs-security-intelligence/understanding-code-signing-
Details Url 2
https://attack.mitre.org/tactics/ta0002/.
Details Url 2
https://www.enisa.europa.eu/topics/nis-directive.
Details Url 2
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/the-state-of-scada-hmi-vulnerabilities.
Details Url 2
https://www.zerodayinitiative.com/blog/2018/7/9/checking-in-a-look-back-at-the-first-half-of-2018.
Details Url 2
https://www.zdnet.com/article/cryptojacking-attacks-surge-against-enterprise-cloud-environments/.
Details Url 2
https://www.zdnet.com/article/what-is-docker-and-why-is-it-so-darn-popular/.
Details Url 2
https://www.forbes.com/sites/udinachmany/2018/11/01/kubernetes-evolution-of-an-it-revolution/#366fcb4554e1
Details Url 2
https://www.cvedetails.com/vulnerability-
Details Url 3
https://www.zdnet.com/article/kubernetes-first-major-security-hole-discovered/.
Details Url 2
https://kromtech.com/blog/security-center/cryptojacking-invades-cloud-how-modern-containerization-trend-is-
Details Url 2
http://blog.trendmicro.com/threat-morphosis/.
Details Url 5
https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/.
Details Url 2
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/linux-security-a-closer-look-at-the-latest-linux-threats.
Details Url 109
https://www.virusbulletin.com
Details Url 2
https://www.cnbc.com/2018/07/20/google-nest-senior-living-aging.html
Details Url 2
https://www.marketwatch.com/story/these-common-scams-target-the-elderlyhow-to-avoid-them-2018-11-15.
Details Url 2
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/threats-to-voice-based-iot-and-iiot-devices.
Details Url 2
https://www.csoonline.com/article/3247708/security/research-suggests-cybersecurity-skills-shortage-is-getting-worse.html