Click here to download all references as Bib-File.•
| 2025-03-05
            
            ⋅
            
            HUMAN
            ⋅ Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes BADBOX | 
| 2025-02-04
            
            ⋅
            
            FortiGuard Labs
            ⋅ Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst Sshdinjector | 
| 2024-04-09
            
            ⋅
            
            Cisco Talos
            ⋅ Starry Addax targets human rights defenders in North Africa with new malware Starry Addax | 
| 2023-11-20
            
            ⋅
            
            Outpost24
            ⋅ Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection Lumma Stealer | 
| 2023-10-11
            
            ⋅
            
            Microsoft
            ⋅ Automatic disruption of human-operated attacks through containment of compromised user accounts Akira Akira | 
| 2023-04-20
            
            ⋅
            
            Interlab
            ⋅ Uncovering nation state watering hole credential harvesting campaigns targeting human rights activists by APT threat group UCID902 | 
| 2022-12-05
            
            ⋅
            
            Human Rights Watch
            ⋅ Iran: State-Backed Hacking of Activists, Journalists, Politicians | 
| 2022-09-23
            
            ⋅
            
            humansecurity
            ⋅ Poseidon’s Offspring: Charybdis and Scylla | 
| 2022-08-16
            
            ⋅
            
            Recorded Future
            ⋅ RedAlpha Conducts Multi-Year Credential Theft Campaign Targeting Global Humanitarian, Think Tank, and Government Organizations RedAlpha | 
| 2022-07-20
            
            ⋅
            
            Mandiant
            ⋅ Evacuation and Humanitarian Documents used to Spear Phish Ukrainian Entities Cobalt Strike GraphSteel GrimPlant MicroBackdoor | 
| 2022-04-05
            
            ⋅
            
            CitizenLab
            ⋅ Peace through Pegasus Jordanian Human Rights Defenders and Journalists Hacked with Pegasus Spyware Chrysaor | 
| 2022-03-24
            
            ⋅
            
            NextGov
            ⋅ Ukrainian Cyber Lead Says ‘At Least 4 Types of Malware’ in Use to Target Critical Infrastructure and Humanitarian Aid CaddyWiper DoubleZero HermeticWiper IsaacWiper | 
| 2022-03-18
            
            ⋅
            
            RiskIQ
            ⋅ RiskIQ: Fraudulent Website Attempts to Collect Donations in Support of Ukraine Humanitarian Fund (UHF) | 
| 2022-01-20
            
            ⋅
            
            US Department of Health and Human Services
            ⋅ Log4J Vulnerabilities and the Health Sector | 
| 2022-01-11
            
            ⋅
            
            Recorded Future
            ⋅ Combating Human Trafficking With Threat Intelligence | 
| 2021-11-29
            
            ⋅
            
            Kaspersky
            ⋅ ScarCruft surveilling North Korean defectors and human rights activists Chinotto Chinotto PoorWeb | 
| 2021-11-08
            
            ⋅
            
            CitizenLab
            ⋅ Devices of Palestinian Human Rights Defenders Hacked with NSO Group’s Pegasus Spyware Chrysaor | 
| 2021-09-27
            
            ⋅
            
            Microsoft
            ⋅ A guide to combatting human-operated ransomware: Part 2 | 
| 2021-09-20
            
            ⋅
            
            Microsoft
            ⋅ A guide to combatting human-operated ransomware: Part 1 | 
| 2021-09-02
            
            ⋅
            
            US Department of Health and Human Services
            ⋅ Demystifying BlackMatter BlackMatter BlackMatter DarkSide |