Click here to download all references as Bib-File.•
| 2025-11-20
⋅
Orange Cyberdefense
⋅
A Pain in the Mist: Navigating Operation DreamJob’s arsenal BURNBOOK MISTPEN |
| 2025-11-19
⋅
Amazon
⋅
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare |
| 2025-11-18
⋅
⋅
Cert-UA
⋅
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329) GAMYBEAR |
| 2025-11-13
⋅
Anthropic
⋅
Disrupting the first reported AI-orchestrated cyber espionage campaign |
| 2025-11-13
⋅
Israel National Digital Agency
⋅
SpearSpecter: Unmasking Iran’s IRGC Cyber Operations Targeting High-Profile Individuals TAMECAT |
| 2025-11-05
⋅
nviso
⋅
Decoding VShell: Insights into a Chinese-Language Cyber Espionage Tool VShell |
| 2025-11-04
⋅
The Record
⋅
Treasury sanctions 8 for laundering North Korea earnings from cybercrime, IT worker scheme |
| 2025-10-22
⋅
Trend Micro
⋅
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns Cobalt Strike DracuLoader ShadowPad |
| 2025-10-19
⋅
⋅
CNCERT
⋅
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks DanderSpritz |
| 2025-10-07
⋅
Cybernews
⋅
Steam, Riot Games hit by disruptions: massive DDoS attack suspected Aisuru |
| 2025-10-02
⋅
Security Affairs
⋅
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories Crimson Collective |
| 2025-10-02
⋅
CyberSecurityNews
⋅
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Crimson Collective |
| 2025-09-30
⋅
Google
⋅
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations |
| 2025-09-30
⋅
CIP
⋅
Russian Cyber Operations WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer |
| 2025-09-07
⋅
Hexastrike Cybersecurity
⋅
ValleyRAT Exploiting BYOVD to Kill Endpoint Security ValleyRAT |
| 2025-09-04
⋅
SentinelOne
⋅
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms ContagiousDrop |
| 2025-08-21
⋅
Swiss Post Cybersecurity
⋅
The ClickFix Deception: How a Fake CAPTCHA Deploys an Evasive Infostealer donut_injector |
| 2025-08-12
⋅
bluecyber
⋅
Analysis of a ClickFix malware attack Vidar |
| 2025-08-10
⋅
DEFCON 33
⋅
Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors |
| 2025-07-30
⋅
RUSI
⋅
What Singapore's First Public Cyber Attribution Tells Us |