Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence Through NRD's ( New Registered Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via TLD's ( Top Level Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via GTLD's ( Generic Top Level Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence visa ccTLD ( country code top-level domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence ( Compromised domain list ) via ZoneFiles
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via Newly Registered Domains
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence vis Domain Monitoring ( ccTLD , gTLD , TLD , Malware Zones )
2025-07-22MicrosoftMicrosoft Threat Intelligence
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Storm-2603
2025-06-30MicrosoftMicrosoft Threat Intelligence
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
2025-06-24BridewellBridewell
2025 Cyber Threat Intelligence Report
AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver
2025-06-20Twitter (@threatintel)Threat Intelligence
Tweet about wiper deployed against Albania by Druidfly
2025-06-12InfobloxInfoblox Threat Intelligence Group
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal
DollyWay
2025-05-27MicrosoftMicrosoft Threat Intelligence
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Void Blizzard
2025-05-06InfobloxInfoblox Threat Intelligence Group
Telegram Tango: Dancing with a Scammer
2025-04-23MicrosoftMicrosoft Threat Intelligence
Understanding the threat landscape for Kubernetes and containerized assets
Storm-1977
2025-04-16IBM X-ForceIBM Security X-Force Team
IBM X-Force 2025 Threat Intelligence Index
2025-04-08MicrosoftMicrosoft Threat Intelligence
Exploitation of CLFS zero-day leads to ransomware activity
RansomEXX Storm-2460
2025-04-03MicrosoftMicrosoft Threat Intelligence
Threat actors leverage tax season to deploy tax-themed phishing campaigns
Brute Ratel C4 CloudEyE Latrodectus Remcos Storm-0249
2025-03-27InfobloxInfoblox Threat Intelligence Group
A Phishing Tale of DoH and DNS MX Abuse
2025-03-06Twitter (@MsftSecIntel)Microsoft Threat Intelligence
Tweet about Moonstone Sleet dropping Qilin ransomware
Qilin