Recently, Operation Pawn Storm targeted the international investigation team of the MH17 plane crash from different sides. It appears that a coordinated attack was launched to gain unauthorized access to sensitive material of the investigation.
Well-designed attacks proceed in six components that show how attackers progress within their targets. Learn about the components that make for a successful campaign to know how to form a proper threat response plan.
Backdoors are applications that open computers to remote access, and are used as a way to avoid detection and carry out targeted attacks. How can IT administrators secure their networks against these backdoor techniques?
This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.