Click here to download all references as Bib-File.•
| 2026-01-16
⋅
WithSecure
⋅
To the past and beyond: Andariel’s latest arsenal and cyberattacks GopherRAT JelusRAT PetitPotato |
| 2026-01-15
⋅
CyberArk
⋅
UNO reverse card: stealing cookies from cookie stealers Stealc |
| 2026-01-14
⋅
Microsoft
⋅
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations |
| 2026-01-12
⋅
⋅
Cert-UA
⋅
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092) PLUGGYAPE Void Blizzard |
| 2026-01-06
⋅
Resecurity
⋅
Cyber Counterintelligence (CCI): When 'Shiny Objects' trick 'Shiny Hunters' |
| 2026-01-02
⋅
The Record
⋅
Sedgwick confirms cyber incident affecting its major federal contractor subsidiary TridentLocker |
| 2025-12-27
⋅
bluecyber
⋅
APT Earth Baxia - Charon Ransomware: An In-Depth Analysis Charon |
| 2025-12-15
⋅
Amazon
⋅
Amazon Threat Intelligence identifies Russian cyber threat group targeting Western critical infrastructure |
| 2025-12-15
⋅
Bleeping Computer
⋅
French Interior Ministry confirms cyberattack on email servers |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Environmental Protection Agency
⋅
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-04
⋅
Amazon
⋅
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) |
| 2025-12-04
⋅
CISA
⋅
Malware Analysis Report (MAR) BRICKSTORM Backdoor BRICKSTORM |
| 2025-11-28
⋅
SOCRadar
⋅
AI-Powered Cyber Espionage: Inside the GTG-1002 Campaign GTG-1002 |
| 2025-11-20
⋅
Orange Cyberdefense
⋅
A Pain in the Mist: Navigating Operation DreamJob’s arsenal BURNBOOK MISTPEN |
| 2025-11-19
⋅
Natto Thoughts
⋅
China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs |
| 2025-11-19
⋅
Amazon
⋅
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare |
| 2025-11-18
⋅
Cybereason
⋅
License to Encrypt: “The Gentlemen” Make Their Move Gentlemen The Gentlemen |
| 2025-11-18
⋅
⋅
Cert-UA
⋅
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329) GAMYBEAR UAC-0241 |