Yoroi-Cybaze's Security Annual Report 2018 with threats and attacks that bypassed targets security measures. Data have been collected directly from the customer side.
In Deir Ezzor SDF search villages and cities to stop attacks by the Islamic State. In Mosul, the ISF hunt the Daesh militiamen and distribute weapons to civilians.
The cyber security experts: The APT’s malicious code implements a custom protocol that allows traffic to be funneled between a source and a destination IP address.
Sixth chapter of a study on the history of the two groups, to understand why they share the same roots and purposes, aimed at recreating the Caliphate. Saudi Arabia, Qatar and the moderate alternative to jihad.
Published on 3 Telegram channels many leaks on Tehran’s APTs. Clearky cyber security experts: They are authentic and will minimize the potential attacks risks in the next few months.
Damascus intensifies the operation to annihilate the Islamic State and the Al Qaeda linked group in the two provinces. Meanwhile, the SDF at Deir Ezzor point to the Daesh facilitators.
Yoroi-Cybaze cyber security experts: The APT malware is spearhead of a sophisticated cyber arsenal. It could be the tip of the iceberg of a more complex and articulated attack.
The SAA aims to crush the Islamic State and Al Qaeda jihadists on the border with Turkey. In Deir Ezzor, SDF continue manhunts against Daesh sleeper cells.
Proofpoint cyber security experts: cybercrime updated key features of the Trojan and employ new distribution mechanisms, including fake apps and switching to Smoke Loader.
In the first country ISF launch"Lions of Al-Jazirah" against the Islamic State in Anbar, Salahuddin and Nineveh. In the second, SDF, SAA and MaT attack Daesh along borders.