logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Log4j Forever Changed What (Some) Cyber Pros Think About OSS
  • Breaking Down the NASCIO Top 10 for 2023
  • Customer data, encryption key stolen in GoTo breach
  • Microsoft 365 outage takes down Teams, Exchange Online, Outlook
  • How to tackle the cybersecurity skills shortage in the EU

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-45538 (eyoucms) 20 January 2023
  • CVE-2022-45540 (eyoucms) 20 January 2023
  • CVE-2022-45558 (left) 20 January 2023
  • CVE-2022-45541 (eyoucms) 20 January 2023
  • CVE-2022-45539 (eyoucms) 20 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Iran-linked APT groups continue to evolve

Posted on 20 November 2021

From cyberdefensemagazine.com

The Microsoft Threat Intelligence Center (MSTIC) shared the results of their analysis on the evolution of Iran-linked threat actors at theĀ CyberWarCon 2021. Over the past 12 months, MSTIC experts observed increasingly sophisticated attacks orchestrated by Iranian APT groups.

Read more…

Posted in News

Post navigation

Previous post: Geo-Recon – An OSINT CLI Tool Desgined To Fast Track IP Reputation And Geo-locaton Look Up For Security Analysts
Next post: AT&T Alien Labs finds new Golang malware (BotenaGo) targeting millions of routers and IoT devices with more than 30 exploits
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.