US security group FireEye said that the Molerats, an extension of the Gaza Hacker Team, use e-mail, document attachments and malicious website links to remotely install malware, which they can then use to steal data or compromise operations.
US security group FireEye said that the Molerats, an extension of the Gaza Hacker Team, use e-mail, document attachments and malicious website links to remotely install malware, which they can then use to steal data or compromise operations.
“APT” is a term created by the U.S. Air Force to describe Chinese threat actors. The most common case where term APT is used is a targeted attack. Most of which are done via spoofed email messages. Most of which contain booby-trapped document attachments. Most of which show some actual content to the victim in […]
Our mission is to help users and also IT security passionate to reach relevant information related to cyber security.
This publication contains a lot of information and guidance on how to better protect your IT systems, data and activities from malicious factors, and also on how to safely navigate the Internet.
We look forward to hearing from you about cyber safety. Please let us know if there’s something specific you’re interested in learning about.
Latest Comments