Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-01heavyscientist
Aisuru DDoS Campaign: Threat Intelligence Assessment
Aisuru
2025-09-30InfobloxInfoblox Threat Intelligence Group
Detour Dog: DNS Malware Powers Strela Stealer Campaigns
StrelaStealer
2025-09-16InfobloxInfoblox Threat Intelligence Group
Deniability by Design: DNS-Driven Insights into a Malicious Ad Network
2025-08-27AnthropicAnthropic
Anthropic - Threat Intelligence Report: August 2025
BeaverTail OtterCookie GolangGhost InvisibleFerret GolangGhost
2025-08-25GoogleGoogle Threat Intelligence Group
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
STATICPLUGIN
2025-07-31MicrosoftMicrosoft Threat Intelligence
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
ApolloShadow
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence Through NRD's ( New Registered Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via TLD's ( Top Level Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via GTLD's ( Generic Top Level Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence visa ccTLD ( country code top-level domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence ( Compromised domain list ) via ZoneFiles
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via Newly Registered Domains
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence vis Domain Monitoring ( ccTLD , gTLD , TLD , Malware Zones )
2025-07-22MicrosoftMicrosoft Threat Intelligence
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Storm-2603
2025-06-30MicrosoftMicrosoft Threat Intelligence
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
2025-06-24BridewellBridewell
2025 Cyber Threat Intelligence Report
AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver
2025-06-20Twitter (@threatintel)Threat Intelligence
Tweet about wiper deployed against Albania by Druidfly
2025-06-12InfobloxInfoblox Threat Intelligence Group
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal
DollyWay
2025-05-27MicrosoftMicrosoft Threat Intelligence
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Void Blizzard
2025-05-06InfobloxInfoblox Threat Intelligence Group
Telegram Tango: Dancing with a Scammer