Interactive Mapping of APT-C-23
By
Research by: Aseel Kayal Last month, we investigated the renewal of a targeted attack against the Palestinian Authority, attributed to the APT-C-23 threat group. Although this campaign was initially discovered in early 2017, it is still active today and has been using both desktop and mobile attack vectors throughout the past year. Dubbed by Check… Click to Read More
The post Interactive Mapping of APT-C-23 appeared first on Check Point Research.
You may also like
March 2026 Cyber Threat Landscape Shows No Relief as Ransomware Rebounds and GenAI Risks Intensify
Global Attack Volumes Begin to Moderate In March 2026, global cyber attack activity ...
Tax Season 2026: How Cyber Criminals Are Preparing Their Attacks Months in Advance
Tax season remains one of the most attractive periods of ...
Iran-nexus Password Spray Campaign Targeting Cloud Environments, with a Focus on the Middle East
Key Findings Check Point Research (CPR) has been tracking an ...
When Trusted Software Updates Become the Attack Vector: Inside Operation TrueChaos and a New Zero Day Vulnerability in a Popular Collaboration Tool
A zero day flaw in a trusted supply chain software ...



