News

They're called watering hole attacks, and in addition to being a longstanding threat they've been behind several high-profile incidents lately. The most infamous watering hole attack in recent ...
Most high-profile watering hole attacks have been loosely attributed to nation states, but in a nifty about-face, these well-funded state-sponsored hackers are borrowing techniques from the arena ...
PwC has published research on four watering hole attacks likely carried out by different attackers, all connected by the ScanBox JavaScript-based reconnaissance tool. The appearance of the ScanBox ...
Thus, we encourage you not to visit these websites. Generally, in a watering hole attack, the adversaries compromise websites that are regularly visited by potential targets. However, in this ...
New research suggests these so-called “watering hole” tactics recently have been used as stepping stones to conduct espionage attacks against a host of targets across a variety of industries ...
If your target is an entire class of people and you're willing to do a watering hole attack, the per-dissident price can be very cheap." It remains far from clear who might be behind the brazen ...
The threat actor combined a watering hole attack strategy with an exploit for a vulnerability in a file transfer client that is required in South Korea to complete certain financial and ...
Cybersecurity experts at ClearSky have discovered a sophisticated watering hole attack targeting multiple Israeli websites. The malicious attempt, believed to be conducted by a nation-state actor from ...