Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
A Pain in the Mist: Navigating Operation DreamJob’s arsenal
BURNBOOK MISTPEN
2025-11-19AmazonCJ Moses
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare
2025-11-18Cert-UACert-UA
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329)
GAMYBEAR
2025-11-13AnthropicAnthropic
Disrupting the first reported AI-orchestrated cyber espionage campaign
2025-11-13Israel National Digital AgencyAdi Pick, Hila David, Idan Beit-Yosef, Shimi Cohen, Yaniv Goldman
SpearSpecter: Unmasking Iran’s IRGC Cyber Operations Targeting High-Profile Individuals
TAMECAT
2025-11-05nvisoMaxime Thiebaut
Decoding VShell: Insights into a Chinese-Language Cyber Espionage Tool
VShell
2025-11-04The RecordJonathan Greig
Treasury sanctions 8 for laundering North Korea earnings from cybercrime, IT worker scheme
2025-10-22Trend MicroDaniel Lunghi, Joseph C Chen, Lenart Bermejo, Leon M Chang, Vickie Su
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns
Cobalt Strike DracuLoader ShadowPad
2025-10-19CNCERTCNCERT
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks
DanderSpritz
2025-10-07CybernewsErnestas Naprys
Steam, Riot Games hit by disruptions: massive DDoS attack suspected
Aisuru
2025-10-02Security AffairsPierluigi Paganini
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories
Crimson Collective
2025-10-02CyberSecurityNewsGuru Baran
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
Crimson Collective
2025-09-30GoogleAswad Robinson, Bhavesh Dhake, Laith Al, Matthew McWhirt, Michael Rudden, Omar ElAhdan
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
2025-09-30CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Russian Cyber Operations
WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer
2025-09-07Hexastrike CybersecurityMaurice Fielenbach
ValleyRAT Exploiting BYOVD to Kill Endpoint Security
ValleyRAT
2025-09-04SentinelOneAleksandar Milenkoski, Kenneth Kinion, Sreekar Madabushi
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
ContagiousDrop
2025-08-21Swiss Post CybersecurityLouis Schürmann
The ClickFix Deception: How a Fake CAPTCHA Deploys an Evasive Infostealer
donut_injector
2025-08-12bluecyberKhắc Minh
Analysis of a ClickFix malware attack
Vidar
2025-08-10DEFCON 33Seongsu Park
Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors
2025-07-30RUSILouise Marie Hurel
What Singapore's First Public Cyber Attribution Tells Us