UNKNOWN
Image Description
Common Information
Type Value
UUID 6410550d-1da2-4ec7-a157-9ff1b17ea32a
Fingerprint 97bcf453931351921cc3f2e303d136bd48ecd2352bb7ee3a022058ac1c69c134
Analysis status DONE
Considered CTI value 0
Text language
Published Dec. 6, 2018, 6:59 p.m.
Added to db April 14, 2024, 10:35 a.m.
Last updated Aug. 30, 2024, 10:47 p.m.
Headline UNKNOWN
Title UNKNOWN
Detected Hints/Tags/Attributes 188/3/75
Attributes
Details Type #Events CTI Value
Details Domain 245
shutterstock.com
Details Domain 14
gs.statcounter.com
Details Domain 19
motherboard.vice.com
Details Domain 3
www.today.com
Details Domain 2
news.gallup.com
Details Domain 2
www.polycom.com
Details Domain 20
www.idc.com
Details Domain 177
blog.trendmicro.com
Details Domain 133
www.infosecurity-magazine.com
Details Domain 30
fortune.com
Details Domain 175
www.zdnet.com
Details Domain 604
www.trendmicro.com
Details Domain 18
www.telegraph.co.uk
Details Domain 177
www.wired.com
Details Domain 360
attack.mitre.org
Details Domain 34
www.enisa.europa.eu
Details Domain 62
www.zerodayinitiative.com
Details Domain 28
forbes.com
Details Domain 29
www.cvedetails.com
Details Domain 202
krebsonsecurity.com
Details Domain 247
www.virusbulletin.com
Details Domain 37
www.cnbc.com
Details Domain 8
www.marketwatch.com
Details File 2
the-cost-of-credential-stuffing-asia-pacific.pdf
Details File 2
advice-a8337016.html
Details File 2
report_gen_1216_web_final_rj.pdf
Details File 2
changing-needs-of-the-workplace-whitepaper-enus.pdf
Details File 10
getdoc.jsp
Details File 384
www.inf
Details File 2
kubernetes-kubernetes.html
Details File 2
google-nest-senior-living-aging.html
Details File 252
www.cs
Details File 2
research-suggests-cybersecurity-skills-shortage-is-getting-worse.html
Details Url 2
http://gs.statcounter.com/os-market-share/all/worldwide/2013.
Details Url 3
http://gs.statcounter.com/os-market-share.
Details Url 1
https://motherboard.vice.com
Details Url 1
https://www.akamai
Details Url 1
https://www.today.com/parents/how-online-sextortion-drove-one-young-man-suicide-t122735.
Details Url 2
https://www.independent.co.uk/news/uk/crime/blackmail-online-sextortion-suicides-videos-photos-sexual-police-
Details Url 2
https://www.greenocktelegraph.co.uk/news/17204102.inverclyde
Details Url 2
https://news.gallup.com/file/reports/199961/soaw_
Details Url 2
http://www.polycom.com/content/dam/polycom
Details Url 2
https://www.idc.com/getdoc.jsp?containerid=prus44361618
Details Url 2
https://blog.trendmicro.com/trendlabs-security-intelligence/iot-devices-need-better-builtin-security/.
Details Url 2
https://blog.trendmicro.com/what-hipaa-and-other-compliance-teaches-us-about-the-reality-of-gdpr/.
Details Url 2
https://www.infosecurity-magazine.com/news/ico-swamped-with-gdpr-breach/.
Details Url 2
http://fortune.com/2018/12/04/targeted-email-fraud/.
Details Url 2
https://www.zdnet.com/article/automation-will-become-central-to-business-strategy-and-operations/.
Details Url 2
https://blog.trendmicro.com/trendlabs-security-intelligence/digital-extortion-forward-looking-view/.
Details Url 2
https://carnegieeurope.eu/2018/06/27/europe-up-for-grabs-looming-battle-lines-of-2019-european-parliament-
Details Url 2
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/fake-news-
Details Url 2
https://www.telegraph.co.uk/news/2018/09/20/government-draws-plans-social-media-regulator-following-
Details Url 2
https://arstechnica.com/information-technology/2016/11/adobe-voco-photoshop-for-audio-speech-editing/.
Details Url 2
https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/.
Details Url 3
https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
Details Url 2
https://www.theverge.com/2018/9/28/17874768/california-iot-smart-device-cybersecurity-bill-sb-327-signed-law.
Details Url 2
https://blog.trendmicro.com/trendlabs-security-intelligence/understanding-code-signing-
Details Url 2
https://attack.mitre.org/tactics/ta0002/.
Details Url 2
https://www.enisa.europa.eu/topics/nis-directive.
Details Url 2
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/the-state-of-scada-hmi-vulnerabilities.
Details Url 2
https://www.zerodayinitiative.com/blog/2018/7/9/checking-in-a-look-back-at-the-first-half-of-2018.
Details Url 2
https://www.zdnet.com/article/cryptojacking-attacks-surge-against-enterprise-cloud-environments/.
Details Url 2
https://www.zdnet.com/article/what-is-docker-and-why-is-it-so-darn-popular/.
Details Url 2
https://www.forbes.com/sites/udinachmany/2018/11/01/kubernetes-evolution-of-an-it-revolution/#366fcb4554e1
Details Url 2
https://www.cvedetails.com/vulnerability-
Details Url 3
https://www.zdnet.com/article/kubernetes-first-major-security-hole-discovered/.
Details Url 2
https://kromtech.com/blog/security-center/cryptojacking-invades-cloud-how-modern-containerization-trend-is-
Details Url 2
http://blog.trendmicro.com/threat-morphosis/.
Details Url 5
https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/.
Details Url 2
https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/linux-security-a-closer-look-at-the-latest-linux-threats.
Details Url 109
https://www.virusbulletin.com
Details Url 2
https://www.cnbc.com/2018/07/20/google-nest-senior-living-aging.html
Details Url 2
https://www.marketwatch.com/story/these-common-scams-target-the-elderlyhow-to-avoid-them-2018-11-15.
Details Url 2
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/threats-to-voice-based-iot-and-iiot-devices.
Details Url 2
https://www.csoonline.com/article/3247708/security/research-suggests-cybersecurity-skills-shortage-is-getting-worse.html