Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-27bluecyberNigmaz
APT Earth Baxia - Charon Ransomware: An In-Depth Analysis
Charon
2025-12-15AmazonCJ Moses
Amazon Threat Intelligence identifies Russian cyber threat group targeting Western critical infrastructure
2025-12-15Bleeping ComputerSergiu Gatlan
French Interior Ministry confirms cyberattack on email servers
2025-12-09Department of JusticeOffice of Public Affairs
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Environmental Protection AgencyEPA Press Office
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups
2025-12-09Department of JusticeU.S. Attorney's Office Central District of California
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-04AmazonCJ Moses
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
2025-12-04CISACanadian Centre for Cyber Security, CISA, NSA
Malware Analysis Report (MAR) BRICKSTORM Backdoor
BRICKSTORM
2025-11-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
A Pain in the Mist: Navigating Operation DreamJob’s arsenal
BURNBOOK MISTPEN
2025-11-19Natto ThoughtsEugenio Benincasa, Natto Team
China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs
2025-11-19AmazonCJ Moses
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare
2025-11-18Cert-UACert-UA
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329)
GAMYBEAR
2025-11-13AnthropicAnthropic
Disrupting the first reported AI-orchestrated cyber espionage campaign
2025-11-13Israel National Digital AgencyAdi Pick, Hila David, Idan Beit-Yosef, Shimi Cohen, Yaniv Goldman
SpearSpecter: Unmasking Iran’s IRGC Cyber Operations Targeting High-Profile Individuals
TAMECAT
2025-11-05nvisoMaxime Thiebaut
Decoding VShell: Insights into a Chinese-Language Cyber Espionage Tool
VShell
2025-11-04The RecordJonathan Greig
Treasury sanctions 8 for laundering North Korea earnings from cybercrime, IT worker scheme
2025-11-03Breached CompanyBreached Company
When the Defenders Become the Attackers: Cybersecurity Experts Indicted for BlackCat Ransomware Operations
BlackCat BlackCat
2025-10-22Multilateral Sanctions Monitoring TeamMultilateral Sanctions Monitoring Team
The DPRK's Violation and Evasion of UN Sanctions through Cyber and Information Technology Worker Activities
2025-10-22Trend MicroDaniel Lunghi, Joseph C Chen, Lenart Bermejo, Leon M Chang, Vickie Su
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns
Cobalt Strike DracuLoader ShadowPad
2025-10-19CNCERTCNCERT
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks
DanderSpritz