
researchcenter.paloaltonetworks.com/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit
Preview meta tags from the researchcenter.paloaltonetworks.com website.
Linked Hostnames
19- 66 links towww.paloaltonetworks.com
- 57 links tounit42.paloaltonetworks.com
- 2 links tostart.paloaltonetworks.com
- 2 links totwitter.com
- 2 links towww.facebook.com
- 2 links towww.linkedin.com
- 1 link toblog.paloaltonetworks.com
- 1 link toblog.trendmicro.com
Thumbnail

Search Engine Appearance
https://researchcenter.paloaltonetworks.com/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit
APT Group UPS Targets US Government with Hacking Team Flash Exploit
Unit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.
Bing
APT Group UPS Targets US Government with Hacking Team Flash Exploit
https://researchcenter.paloaltonetworks.com/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit
Unit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.
DuckDuckGo

APT Group UPS Targets US Government with Hacking Team Flash Exploit
Unit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.
General Meta Tags
13- titleAPT Group UPS Targets US Government with Hacking Team Flash Exploit
- charsetUTF-8
- viewportwidth=device-width, initial-scale=1
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
- descriptionUnit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.
Open Graph Meta Tags
22og:locale
en_US- og:typearticle
- og:titleAPT Group UPS Targets US Government with Hacking Team Flash Exploit
- og:descriptionUnit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.
- og:urlhttps://unit42.paloaltonetworks.com/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/
Twitter Meta Tags
1- twitter:cardsummary_large_image
Link Tags
32- EditURIhttps://unit42.paloaltonetworks.com/xmlrpc.php?rsd
- alternatehttps://unit42.paloaltonetworks.com/feed/
- alternatehttps://unit42.paloaltonetworks.com/comments/feed/
- alternatehttps://unit42.paloaltonetworks.com/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/feed/
- alternatehttps://unit42.paloaltonetworks.com/wp-json/wp/v2/posts/9674
Website Locales
3en
https://unit42.paloaltonetworks.com/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/ja
https://unit42.paloaltonetworks.com/ja/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/x-default
https://unit42.paloaltonetworks.com/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/
Emails
1- ?subject=APT%20Group%20UPS%20Targets%20US%20Government%20with%20Hacking%20Team%20Flash%20Exploit&body=Check%20out%20this%20article%20https%3A%2F%2Funit42.paloaltonetworks.com%2Fapt-group-ups-targets-us-government-with-hacking-team-flash-exploit%2F
Links
144- https://blog.paloaltonetworks.com/2015/07/palo-alto-networks-traps-protects-from-latest-flash-zero-day-vulnerability-cve-2015-5119/%20
- https://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak
- https://docs.paloaltonetworks.com
- https://events.paloaltonetworks.com
- https://gist.github.com/mak/bd71962aae98ab0b0441