News
They're called watering hole attacks, and in addition to being a longstanding threat they've been behind several high-profile incidents lately. The most infamous watering hole attack in recent ...
Most high-profile watering hole attacks have been loosely attributed to nation states, but in a nifty about-face, these well-funded state-sponsored hackers are borrowing techniques from the arena ...
PwC has published research on four watering hole attacks likely carried out by different attackers, all connected by the ScanBox JavaScript-based reconnaissance tool. The appearance of the ScanBox ...
Thus, we encourage you not to visit these websites. Generally, in a watering hole attack, the adversaries compromise websites that are regularly visited by potential targets. However, in this ...
This tactic is known as a watering hole attack, in which a legit site that valuable netizens often visit is compromised so it can be used to in turn compromise those targets. You may remember ...
The threat actor combined a watering hole attack strategy with an exploit for a vulnerability in a file transfer client that is required in South Korea to complete certain financial and ...
Cybersecurity experts at ClearSky have discovered a sophisticated watering hole attack targeting multiple Israeli websites. The malicious attempt, believed to be conducted by a nation-state actor from ...
Google LLC’s Threat Analysis Group today shared details on multiple observed in-the-wild exploit campaigns that used watering-hole attacks on Mongolian government websites between November 2023 ...
According to the South Korean police, Lazarus Group attempted to hack more than 200 computers belonging to 61 South Korean institutions last year through the so-called “watering hole” attack.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results