Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-11-16YouTube (Swiss Cyber Storm)Angelo Violetti
Resilience Rising: Countering the Threat Actors Behind Black Basta Ransomware
Black Basta
2023-11-11Precision PC OnlinePrecision PC Online
A Unified Front Against Cyber Mercenaries
Blue Tsunami
2023-11-09MicrosoftMicrosoft Threat Intelligence
Microsoft shares threat intelligence at CYBERWARCON 2023
Blue Tsunami
2023-11-09CYBERWARZONETech Team
Tasnim News Hacked By WeRedEvils
WeRedEvils
2023-10-31InfobloxInfoblox Threat Intelligence Group
Prolific Puma: Shadowy Link Shortening Service Enables Cybercrime
Prolific Puma
2023-10-30Check Point ResearchCheck Point
Evolving Cyber Dynamics Amidst the Israel-Hamas Conflict
SYLHET GANG-SG
2023-10-24Sentinel LABSAleksandar Milenkoski, Tom Hegel
The Israel-Hamas War | Cyber Domain State-Sponsored Activity of Interest
ShroudedSnooper
2023-10-23Twitter (@embee_research)Embee_research
Cobalt Strike .VBS Loader - Decoding with Advanced CyberChef and Emulation
Cobalt Strike
2023-10-20Twitter (@embee_research)Embee_research
Decoding a Cobalt Strike .hta Loader Using CyberChef and Emulation
Cobalt Strike
2023-10-15CyberCTOOllie Whitehouse
Chinese Cyber: Resources for Western Researchers
2023-10-15Cert-UACert-UA
Peculiarities of destructive cyber attacks against Ukrainian providers (CERT-UA#7627)
Poseidon UAC-0006
2023-10-13SentinelOneSentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 41
Storm-0062
2023-10-10MandiantAdrian Hernandez, Austin Larsen, JEFF JOHNSON, Michael Barnhart, Michelle Cantos, Taylor Long
Assessed Cyber Structure and Alignments of North Korea in 2023
TraderTraitor
2023-10-09SOCRadarSOCRadar
Reflections of the Israel-Palestine Conflict on the Cyber World
StucxTeam
2023-10-09LinkedIn (Shubhi Soral)Shubhi Soral
Cyber Criminals Using EvilProxy Phishing Kit To Target Senior Executives in U.S. Firms
Storm-0835
2023-10-07CybereasonDerrick Masters
Taking Shortcuts: Using LNK files for initial infection and persistence
2023-10-06CYBERWARZONEReza Rafati
Hacking Group ‘Cyber Av3ngers’ Claims Responsibility for Yavne Power Outages: What You Need to Know
Cyber Av3ngers
2023-10-05EclecticIQArda Büyükkaya
Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia
ChargeWeapon Carderbee
2023-10-03The RecordJonathan Greig
NATO 'actively addressing' alleged cyberattack affecting some websites
SiegedSec
2023-10-01CYBERWARZONEReza Rafati
ShinyHunters’ 22-Year-Old Member Pleads Guilty to Cyber Extortion, Causing $6 Million in Damage
ShinyHunters