Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2023-08-30 10:00:05 |
Évolution des menaces informatiques au deuxième trimestre 2023 IT threat evolution in Q2 2023 (lien direct) |
Aperçu du deuxième trimestre 2023 : attaques ciblées telles que l'opération Triangulation, l'activité CloudWizard et Lazarus, le ransomware Nokoyawa et autres.
Q2 2023 overview: targeted attacks such as Operation Triangulation, CloudWizard and Lazarus activity, Nokoyawa ransomware, and others. |
Threat
|
APT 38
|
★★★
|
|
2023-04-12 08:00:00 |
Suivant le groupe Lazare en suivant la campagne DeathNote Following the Lazarus group by tracking DeathNote campaign (lien direct) |
Le groupe Lazare est un acteur de menace coréen de haut niveau avec plusieurs sous-campagnols.Dans ce blog, nous nous concentrons sur un cluster actif que nous avons surnommé DeathNote.
The Lazarus group is a high-profile Korean-speaking threat actor with multiple sub-campaigns. In this blog, we\'ll focus on an active cluster that we dubbed DeathNote. |
Threat
|
APT 38
|
★★★
|
|
2022-05-27 08:00:43 |
IT threat evolution Q1 2022 (lien direct) |
Kaspersky IT threat review in Q1 2022: activity of APTs such as MoonBounce, BlueNororff, Lazarus and Roaming Mantis, attacks against Ukraine, phishing kits, Okta hack and more. |
Threat
Hack
|
APT 38
|
★★★
|
|
2020-12-23 10:00:08 |
Lazarus covets COVID-19-related intelligence (lien direct) |
As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that actors, such as the Lazarus group, are going after intelligence that could help these efforts by attacking entities related to COVID-19 research. |
Threat
Medical
|
APT 38
APT 28
|
|