Investigation of a watering hole cyber attack

The investigation is not about a tiger lurking around a source of drinking water to launch a deadly attack but it’s about a recent cyber watering hole attack that was observed on a number of organizations networks. It discusses why and how the watering hole site was compromised, as well as the threat actor group suspected of being responsible for the attack.

Read more here – http://www.contextis.co.uk/research/blog/crouching-tiger-ihs-watering-hole/

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top