Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

CyberX

Below you will find reports with the source of “CyberX”

image from 2019 Global ICS & IIoT Risk Report

2019 Global ICS & IIoT Risk Report

This report provides a “data-driven analysis of vulnerabilities in our industrial and critical infrastructure.”
Added: November 21, 2018
image from Operation BugDrop: CyberX Discovers Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations

Operation BugDrop: CyberX Discovers Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations

CyberX has discovered a new, large-scale cyber-reconnaissance operation targeting a broad range of targets in the Ukraine. Because it eavesdrops on sensitive conversations by remotely controlling PC microphones – in order to surreptitiously “bug” its targets – and uses Dropbox to store exfiltrated data, CyberX has named it “Operation BugDrop. (more available)
Added: November 15, 2018
© Cyentia Institute 2021
Library updated: March 5, 2021 12:07 UTC (build 7e736b2)