News

They're called watering hole attacks, and in addition to being a longstanding threat they've been behind several high-profile incidents lately. The most infamous watering hole attack in recent ...
Most high-profile watering hole attacks have been loosely attributed to nation states, but in a nifty about-face, these well-funded state-sponsored hackers are borrowing techniques from the arena ...
PwC has published research on four watering hole attacks likely carried out by different attackers, all connected by the ScanBox JavaScript-based reconnaissance tool. The appearance of the ScanBox ...
Thus, we encourage you not to visit these websites. Generally, in a watering hole attack, the adversaries compromise websites that are regularly visited by potential targets. However, in this ...
If your target is an entire class of people and you're willing to do a watering hole attack, the per-dissident price can be very cheap." It remains far from clear who might be behind the brazen ...
Dragos labeled the attack as a “watering hole attack.” According to the Computer Security Resource Center, a watering hole attack features an attacker “compromising a site likely to be ...
The threat actor combined a watering hole attack strategy with an exploit for a vulnerability in a file transfer client that is required in South Korea to complete certain financial and ...
Cybersecurity experts at ClearSky have discovered a sophisticated watering hole attack targeting multiple Israeli websites. The malicious attempt, believed to be conducted by a nation-state actor from ...
Google LLC’s Threat Analysis Group today shared details on multiple observed in-the-wild exploit campaigns that used watering-hole attacks on Mongolian government websites between November 2023 ...