One Article Review

Accueil - L'article:
Source InfoSecurityMag.webp InfoSecurity Mag
Identifiant 7181466
Date de publication 2022-09-28 16:00:00 (vue: 2022-09-28 16:06:38)
Titre Hackers Use Telegram and Signal to Assist Protestors in Iran (Recyclage)
Texte Key activities are data leaking and selling, including officials' phone numbers and emails
Envoyé Oui
Condensat activities are assist data emails hackers including iran key leaking numbers officials phone protestors selling signal telegram use
Tags
Stories
Notes
Move


Les reprises de l'article (1):
Source Checkpoint.webp Checkpoint
Identifiant 7181280
Date de publication 2022-09-28 15:10:06 (vue: 2022-09-28 16:06:08)
Titre Hacker Groups take to Telegram, Signal and Darkweb to assist Protestors in Iran
Texte >Check Point Research (CPR) sees multiple hacker groups using Telegram, Signal and the darkweb to aid anti-government protestors in Iran bypass regime restrictions. Key activities are data leaking and selling, including officials’ phone numbers and emails, and maps of sensitive locations. CPR sees the sharing of open VPN servers to bypass censorship and reports on…
Envoyé Oui
Condensat >check activities aid anti are assist bypass censorship cpr darkweb data emails government groups hacker including iran key leaking locations maps multiple numbers officials’ on… open phone point protestors regime reports research restrictions sees selling sensitive servers sharing signal take telegram using vpn
Tags
Stories
Notes
Move


L'article ressemble à 1 autre(s) article(s):
Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2022-09-29 15:26:00 (Déjà vu) Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks (lien direct) Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to bypass regime censorship restrictions amid ongoing unrest in the country following the death of Mahsa Amini in custody. "Key activities are data leaking and selling, including officials' phone numbers and emails, and maps of sensitive locations," Israeli cybersecurity firm Check Point said in
My email: