Tonto Team

Tonto Team is a suspected Chinese state-sponsored cyber espionage threat group that has primarily targeted South Korea, Japan, Taiwan, and the United States since at least 2009; by 2020 they expanded operations to include other Asian as well as Eastern European countries. Tonto Team has targeted government, military, energy, mining, financial, education, healthcare, and technology organizations, including through the Heartbeat Campaign (2009-2012) and Operation Bitter Biscuit (2017).

This Cyber News was published on attack.mitre.org. Publication date: Thu, 07 Dec 2023 22:12:07 +0000


Cyber News related to Tonto Team

CVE-2024-58071 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
Tonto Team - Tonto Team is a suspected Chinese state-sponsored cyber espionage threat group that has primarily targeted South Korea, Japan, Taiwan, and the United States since at least 2009; by 2020 they expanded operations to include other Asian as well as ...
2 years ago Attack.mitre.org BITTER Tonto Team
Beyond Protocols: How Team Camaraderie Fortifies Security - When we think about the many different tasks a security team must complete, many of them are challenging and time consuming, to say the least. Logic would dictate that if the security team is of high quality and its members enjoy working with one ...
2 years ago Securityweek.com
How to build a cyber incident response team - As an incident response manager himself, Valentin regularly coordinates security responses for companies of all shapes and sizes - including many of the examples discussed in this post. He explains everything you need to know about building and ...
2 years ago Heimdalsecurity.com
Meet the new CloudGuard: Risk Management in Action - Security teams need to plan the measures taken to reduce the harmful effects of a CVE, to ensure that the applications they are managing remain secure while business availability is not affected, and developers can continue with their day-to-day ...
2 years ago Blog.checkpoint.com
Failing Upwards: Put on your own mask before assisting others - From poor leaders, I've learned what doesn't work: breaking the team's trust, operating without transparency, employing a destructive and unempathetic approach, micromanaging, and setting people up for failure. In contrast to the negative leadership ...
1 year ago Blog.zsec.uk
Do More with Security Orchestration, Automation, and Response - Today, security operations center teams face dual challenges of acquiring both the right caliber and quantity of staff. With this gap, it's important for SOC teams to consider security, orchestration, automation and response solutions to automate ...
2 years ago Securityboulevard.com
10 Best Free Blue Team Tools in 2025 - IT security experts utilize blue team tools to protect against simulated cyber threats launched by the “red team” to improve cybersecurity and penetration testing procedures. Sigma is a blue team tool for creating and using signatures ...
9 months ago Cybersecuritynews.com
3 ways to reduce stress on the DevSecOps team - My session focused on the stresses and burnout experienced by security teams, including recent data showing that 94% of chief information security officers suffer from work-related stress, and 65% admit their stress levels compromise their ability to ...
2 years ago Infoworld.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
Congratulations to our 2023 CX Customer Hero Award Winners - There is no event quite like Cisco Live for our Customer Experience team. Successful transformation happens when innovative leaders dream big and collaborate with Cisco CX to execute on those dreams. Today, we are presenting a Cisco CX Customer Hero ...
2 years ago Feedpress.me
Cisco Gold Partner: A Team Approach to Certification Turns to Gold at Advanced Unibyte - Certifications are an excellent way to achieve self-improvement, greater technical knowledge, and higher career goals. Advanced Unibyte GmbH, based in Metzingen, Germany, has taken the drive for excellence and career growth to new levels with a team ...
1 year ago Feedpress.me Inception
Normalizing Security Culture: Stay Ready - While it may seem like self-promotion or extraneous work, it’s extremely valuable to take the extra time to summarize threats stopped, processes improved, projects completed and team members modeling strong security behavior. Most people don't ...
1 year ago Darkreading.com
Unlocking the Potential of a HighPerforming Security Engineering Group - Security teams are mainly made up of roles related to operations, compliance, and policy. Security engineering teams, on the other hand, are responsible for creating services, automating processes, and streamlining deployments to support the core ...
2 years ago Csoonline.com
CISO Conversations: Three Leading CISOs in the Modern Healthcare Sector - All three are CISOs in one of the world's most attacked sectors: healthcare. All three of our CISOs entered cybersecurity via IT. Dougherty had led the creation of an MSP where he became VP operations. This is a recurring theme in this series of CISO ...
2 years ago Securityweek.com
Before starting your 2024 security awareness program, ask these 10 questions - As Q1 of the new year blasts off, you might feel eager to jump into your 2024 security awareness program immediately. Knowing this will allow you to have these customized groups and targeted training ready in advance, so teams don't unknowingly start ...
2 years ago Securityboulevard.com
CVE-2023-52574 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Strengthening Security Posture Through People-First Engagement - Regular, small doses of security education help combat the “forgetting curve,” a theory developed by Hermann Ebbinghaus that suggests people forget 75% of newly learned information within a couple of days. These statistics underscore a critical ...
1 year ago Informationsecuritybuzz.com
Getting Ahead of the Attack - With threat actors maturing and constantly changing their methods, security teams must always be aware of what's happening on the network. It can be challenging to truly map out what solutions and techniques your teams may need to apply to get ahead ...
2 years ago Cybersecurity-insiders.com
CVE-2025-68340 - In the Linux kernel, the following vulnerability has been resolved: ...
3 weeks ago
CVE-2025-71091 - In the Linux kernel, the following vulnerability has been resolved: ...
56 years ago
Uncovering the Connection Between Moses and Artificial Intelligence - Recently, a team of researchers at Stanford University uncovered a fascinating connection between the Biblical figure Moses and the rapidly advancing field of Artificial Intelligence (AI). According to the research team, Moses demonstrated two ...
2 years ago Thehackernews.com
CVE-2025-21787 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
CVE-2023-54012 - In the Linux kernel, the following vulnerability has been resolved: ...
2 weeks ago
Spotlight: Silvereye Technologies and Perception Point key sponsors at Acronis' Sales Kickoff - During the week of Feb 6th, over 200 of the Acronis Global Sales Leadership Team will gather in Sofia, Bulgaria, to kick off 2023. This year, the annual sales meeting will be sponsored by two Acronis strategic partners: Silvereye Technologies and ...
2 years ago Acronis.com