Back to Results
First PageMeta Content
Malware / Targeted threat / Threat / Trojan horse / Attack / Cyberwarfare / Computer network security / Computer security


A Trend Micro Research Paper Cybercriminals Use What Works Targeted Attack Methodologies for Cybercrime Loucif Kharouni
Add to Reading List

Document Date: 2014-06-10 21:56:05


Open Document

File Size: 1.009,79 KB

Share Result on Facebook

Company

Trend Micro / Myspace / Twitter / Microsoft / /

Country

United States / /

Currency

CVE / /

IndustryTerm

target networks / remote access tools / Web servers / social media posts / social networking platforms / Web-hosting services / legitimate site / malicious site / target systems / vulnerable systems / /

Person

Raimund Genes / /

/

Position

CTO / Administrator / /

Region

Latin America / /

Technology

http / /

URL

fantasia-films.com / EPOFYZMFZGJ.com / /

SocialTag