researchcenter.paloaltonetworks.com/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit

Preview meta tags from the researchcenter.paloaltonetworks.com website.

Linked Hostnames

19

Thumbnail

Search Engine Appearance

Google

https://researchcenter.paloaltonetworks.com/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit

APT Group UPS Targets US Government with Hacking Team Flash Exploit

Unit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.



Bing

APT Group UPS Targets US Government with Hacking Team Flash Exploit

https://researchcenter.paloaltonetworks.com/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit

Unit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.



DuckDuckGo

https://researchcenter.paloaltonetworks.com/2015/07/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit

APT Group UPS Targets US Government with Hacking Team Flash Exploit

Unit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.

  • General Meta Tags

    13
    • title
      APT Group UPS Targets US Government with Hacking Team Flash Exploit
    • charset
      UTF-8
    • viewport
      width=device-width, initial-scale=1
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
    • description
      Unit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.
  • Open Graph Meta Tags

    22
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      APT Group UPS Targets US Government with Hacking Team Flash Exploit
    • og:description
      Unit 42 used the AutoFocus service to locate and investigate activity consistent with a spear-phishing attack targeting the US Government.
    • og:url
      https://unit42.paloaltonetworks.com/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/
  • Twitter Meta Tags

    1
    • twitter:card
      summary_large_image
  • Link Tags

    32
    • EditURI
      https://unit42.paloaltonetworks.com/xmlrpc.php?rsd
    • alternate
      https://unit42.paloaltonetworks.com/feed/
    • alternate
      https://unit42.paloaltonetworks.com/comments/feed/
    • alternate
      https://unit42.paloaltonetworks.com/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/feed/
    • alternate
      https://unit42.paloaltonetworks.com/wp-json/wp/v2/posts/9674
  • Website Locales

    3
    • EN country flagen
      https://unit42.paloaltonetworks.com/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/
    • JA country flagja
      https://unit42.paloaltonetworks.com/ja/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/
    • DEFAULT country flagx-default
      https://unit42.paloaltonetworks.com/apt-group-ups-targets-us-government-with-hacking-team-flash-exploit/

Emails

1
  • ?subject=APT%20Group%20UPS%20Targets%20US%20Government%20with%20Hacking%20Team%20Flash%20Exploit&body=Check%20out%20this%20article%20https%3A%2F%2Funit42.paloaltonetworks.com%2Fapt-group-ups-targets-us-government-with-hacking-team-flash-exploit%2F

Links

144