Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society
Common Information
Type | Value |
---|---|
UUID | e8ec1f1e-eb7e-4bd6-a3ef-2f5a508a62db |
Fingerprint | e4804602e15ec94706c5a3ea433c44a2236d7953315614cc54950b09d5becb0a |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | May 13, 2024, 1:23 p.m. |
Added to db | May 24, 2024, 4:36 p.m. |
Last updated | Aug. 31, 2024, 8:17 a.m. |
Headline | Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society |
Title | Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society |
Detected Hints/Tags/Attributes | 237/4/71 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.ic3.gov/Media/News/2024/240514.pdf |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 152 | cisa.gov |
|
Details | Domain | 20 | cyber.gc.ca |
|
Details | Domain | 1 | cert.ee |
|
Details | Domain | 1 | ncsc.fi |
|
Details | Domain | 2 | www.kyberturvallisuuskeskus.fi |
|
Details | Domain | 4 | www.kantei.go.jp |
|
Details | Domain | 11 | jpcert.or.jp |
|
Details | Domain | 15 | www.npa.go.jp |
|
Details | Domain | 53 | ncsc.gov.uk |
|
Details | Domain | 1 | www.ivaatlik.ee |
|
Details | Domain | 3 | external.cisco.com |
|
Details | Domain | 360 | attack.mitre.org |
|
Details | Domain | 397 | www.microsoft.com |
|
Details | Domain | 172 | www.crowdstrike.com |
|
Details | Domain | 15 | radar.cloudflare.com |
|
Details | Domain | 34 | www.enisa.europa.eu |
|
Details | Domain | 57 | crowdstrike.com |
|
Details | Domain | 98 | www.secureworks.com |
|
Details | Domain | 5 | blog.certfa.com |
|
Details | Domain | 27 | about.fb.com |
|
Details | Domain | 67 | citizenlab.ca |
|
Details | 37 | report@cisa.gov |
||
Details | 8 | contact@cyber.gc.ca |
||
Details | 1 | cert@cert.ee |
||
Details | 1 | ncsc@ncsc.fi |
||
Details | 3 | info@jpcert.or.jp |
||
Details | 1 | spyware@external.cisco.com |
||
Details | 1 | no-spyware@external.cisco.com |
||
Details | File | 1 | nisc_opinion.html |
|
Details | File | 1 | soudan.html |
|
Details | File | 6 | blog.cer |
|
Details | IBM X-Force - Threat Group Enumeration | 34 | ITG18 |
|
Details | MITRE ATT&CK Techniques | 14 | T1591 |
|
Details | MITRE ATT&CK Techniques | 17 | T1593 |
|
Details | MITRE ATT&CK Techniques | 6 | T1593.001 |
|
Details | MITRE ATT&CK Techniques | 34 | T1589 |
|
Details | MITRE ATT&CK Techniques | 50 | T1592 |
|
Details | MITRE ATT&CK Techniques | 33 | T1590 |
|
Details | MITRE ATT&CK Techniques | 100 | T1598 |
|
Details | MITRE ATT&CK Techniques | 409 | T1566 |
|
Details | MITRE ATT&CK Techniques | 310 | T1566.001 |
|
Details | MITRE ATT&CK Techniques | 183 | T1566.002 |
|
Details | MITRE ATT&CK Techniques | 420 | T1204 |
|
Details | MITRE ATT&CK Techniques | 17 | T1660 |
|
Details | MITRE ATT&CK Techniques | 21 | T1430 |
|
Details | MITRE ATT&CK Techniques | 12 | T1636.002 |
|
Details | MITRE ATT&CK Techniques | 17 | T1636.004 |
|
Details | MITRE ATT&CK Techniques | 10 | T1512 |
|
Details | MITRE ATT&CK Techniques | 22 | T1429 |
|
Details | MITRE ATT&CK Techniques | 16 | T1513 |
|
Details | MITRE ATT&CK Techniques | 3 | T1544 |
|
Details | Threat Actor Identifier - APT-C | 17 | APT-C-27 |
|
Details | Threat Actor Identifier - APT | 194 | APT35 |
|
Details | Url | 1 | https://www.kyberturvallisuuskeskus.fi/en/report |
|
Details | Url | 1 | https://www.kantei.go.jp/jp/forms/nisc_opinion.html |
|
Details | Url | 1 | https://www.npa.go.jp/bureau/cyber/soudan.html |
|
Details | Url | 1 | https://www.ivaatlik.ee/disclaimer |
|
Details | Url | 2 | https://www.microsoft.com/en-us/security/security- |
|
Details | Url | 1 | https://www.crowdstrike.com/adversaries/. |
|
Details | Url | 1 | https://radar.cloudflare.com/reports/project- |
|
Details | Url | 1 | https://radar.cloudflare.com/reports/ddos-2023-q2. |
|
Details | Url | 1 | https://radar.cloudflare.com/reports/ddos-2023-q3. |
|
Details | Url | 2 | https://www.enisa.europa.eu/publications/enisa-threat- |
|
Details | Url | 1 | https://www.crowdstrike.com/adversaries/velvet-chollima/. |
|
Details | Url | 1 | https://www.secureworks.com/research/bronze-president- |
|
Details | Url | 1 | https://blog.certfa.com/posts/charming- |
|
Details | Url | 1 | https://securityintelligence.com/posts/itg18-operational-security-errors-plague-iranian-threat-group/. |
|
Details | Url | 1 | https://about.fb.com/news/2021/03/taking-action-against-hackers-in-china/. |
|
Details | Url | 1 | https://citizenlab.ca/2019/09/poison-carp-tibetan-groups-targeted-with-1-click-mobile-exploits/. |
|
Details | Url | 1 | https://www.volexity.com/blog/2019/09/02/digital-crackdown-large-scale-surveillance-and-exploitation-of-uyghurs/. |
|
Details | Url | 1 | https://about.fb.com/news/2021/11/taking-action-against-hackers-in-pakistan-and-syria/amp/. |