Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-05HUMANAdam Sell, Aviad Kaiserman, Gabi Cirlig, Inna Vasilyeva, Joao Marques, João Santos, Lindsay Kaye, Louisa Abel, Maor Elizen, Mikhail Venkov, Nico Agnese, Vikas Parthasarathy, Will Herbig
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes
BADBOX
2025-02-04FortiGuard LabsAxelle Apvrille
Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst
Sshdinjector
2024-04-09Cisco TalosCisco Talos
Starry Addax targets human rights defenders in North Africa with new malware
Starry Addax
2023-11-20Outpost24Alberto Marín
Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection
Lumma Stealer
2023-10-11MicrosoftAmir Kutcher, Charles-Edouard Bettan, Edan Zwick, Noam Hadash, Yair Tsarfaty
Automatic disruption of human-operated attacks through containment of compromised user accounts
Akira Akira
2023-04-20InterlabINTERLAB, Ovi Liber
Uncovering nation state watering hole credential harvesting campaigns targeting human rights activists by APT threat group UCID902
2022-12-05Human Rights WatchHuman Rights Watch
Iran: State-Backed Hacking of Activists, Journalists, Politicians
2022-09-23humansecuritySatori Threat Intelligence and Research Team
Poseidon’s Offspring: Charybdis and Scylla
2022-08-16Recorded FutureInsikt Group®
RedAlpha Conducts Multi-Year Credential Theft Campaign Targeting Global Humanitarian, Think Tank, and Government Organizations
RedAlpha
2022-07-20MandiantMandiant Threat Intelligence
Evacuation and Humanitarian Documents used to Spear Phish Ukrainian Entities
Cobalt Strike GraphSteel GrimPlant MicroBackdoor
2022-04-05CitizenLabBill Marczak, CitizenLab, Front Line Defenders, Mohammed Al-Maskati, Ron Deibert, Siena Anstis
Peace through Pegasus Jordanian Human Rights Defenders and Journalists Hacked with Pegasus Spyware
Chrysaor
2022-03-24NextGovBrandi Vincent
Ukrainian Cyber Lead Says ‘At Least 4 Types of Malware’ in Use to Target Critical Infrastructure and Humanitarian Aid
CaddyWiper DoubleZero HermeticWiper IsaacWiper
2022-03-18RiskIQJennifer Grob, RiskIQ
RiskIQ: Fraudulent Website Attempts to Collect Donations in Support of Ukraine Humanitarian Fund (UHF)
2022-01-20US Department of Health and Human ServicesHHS
Log4J Vulnerabilities and the Health Sector
2022-01-11Recorded FutureInsikt Group®
Combating Human Trafficking With Threat Intelligence
2021-11-29KasperskyGReAT
ScarCruft surveilling North Korean defectors and human rights activists
Chinotto Chinotto PoorWeb
2021-11-08CitizenLabCitizenLab
Devices of Palestinian Human Rights Defenders Hacked with NSO Group’s Pegasus Spyware
Chrysaor
2021-09-27MicrosoftDetection and Response Team (DART)
A guide to combatting human-operated ransomware: Part 2
2021-09-20MicrosoftDetection and Response Team (DART)
A guide to combatting human-operated ransomware: Part 1
2021-09-02US Department of Health and Human ServicesHealth Sector Cybersecurity Coordination Center (HC3)
Demystifying BlackMatter
BlackMatter BlackMatter DarkSide