New destructive data wiper found on hundreds of computers in Ukraine
The malware targets legitimate drivers from the EaseUS Partition Master software to corrupt data.
The malware targets legitimate drivers from the EaseUS Partition Master software to corrupt data.
Since the early 2000s, China has been competing with the US and its allies over dominance of global cyberspace.
Since the early 2000s, China has been competing with the US and its allies over dominance of global cyberspace.
The group has been active since 2012, and has a long history of offensive operations targeting South Korean think tanks, industry, and nuclear power operators.
This is the fourth part of the series which is dedicated to the Berserk Bear.
The second article in the series is focused on targets and TTPs of Lazarus Group.
The third article in the series which is dedicated to the Voodoo Bear hacking group.
North Korea has developed a number of techniques to evade international sanctions and support its struggling economy.
This is the second part of the series which is dedicated to Cozy Bear (APT 29).
In “The Four Bears” series we will tell you about the APT groups known as Fancy Bear, Cozy Bear, Voodoo Bear, and Berserk Bear.
Showing elements 2671 - 2680