
A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.
A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.
A Google sheet spreadsheet containing a comprehensive list of APT groups and operations, providing a reference for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors. The spreadsheet includes tabs for different countries and regions, as well as an 'Unknown' tab for groups with no attribution. It also highlights overlaps between different groups and provides a search function for easy lookup. The spreadsheet is licensed under CC Creative Commons - Attribution 4.0 International (CC BY 4.0) and is open for contributions from threat intel researchers, malware analysts, and vendor representatives.
Common questions about APT Groups and Operations including features, pricing, alternatives, and user reviews.
APT Groups and Operations is A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors. It is a Threat Management solution designed to help security teams with Open Source, Cyber Threat Intelligence.
APT Groups and Operations is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://docs.google.com/spreadsheets/u/1/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/pubhtml/ for download and installation instructions.
Popular alternatives to APT Groups and Operations include:
Compare these tools and more at https://cybersectools.com/categories/threat-management
APT Groups and Operations is for security teams and organizations that need Open Source, Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Cybercrime intelligence tools for searching compromised credentials from infostealers