Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-04-15sysdigAlessandra Rizzo
UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell
SNOWLIGHT Sliver Vshell
2025-04-15SecurityWeekThe Associated Press
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games
2025-04-12CyberSecurity88CyberSecurity88
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack
MORH4x
2025-04-09ResecurityResecurity
Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach
Jabaroot
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Technical analysis and mitigations
badbazaar
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors
badbazaar
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
NCSC and partners share guidance for communities at high risk of digital surveillance
badbazaar
2025-04-07SOC PrimeVeronika Telychko
UAC-0226 Attack Detection: New Cyber-Espionage Campaign Targeting Ukrainian Innovation Hubs and Government Entities with GIFTEDCROOK Stealer
GIFTEDCROOK UAC-0226
2025-04-06GridinsoftGridinsoft Cyber Security
How to Remove Lilith RAT: Complete Removal Guide
Lilith puNK-003
2025-04-03SOC PrimeVeronika Telychko
UAC-0219 Attack Detection: A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL
WRECKSTEEL UAC-0219
2025-04-03SOC PrimeVeronika Telychko
UAC-0219 Attack Detection: A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL
WRECKSTEEL
2025-04-01Cert-UACert-UA
UAC-0219: Cyber ​​espionage using PowerShell stealer WRECKSTEEL (CERT-UA#14283)
WRECKSTEEL UAC-0219
2025-03-25Suresh Reddy
Inside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloads
2025-03-14Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v3
Emmenhtal Lumma Stealer Rhadamanthys
2025-03-11Juniper NetworksCybersecurity R&D
The RedPenguin Malware Incident
tsh
2025-03-10CybershafaratTreadstone 71
DieNet and #Shiite_Harvest claimed responsibility for disabling ten significant Iraqi websites
DieNet
2025-03-06Orange CyberdefenseOrange Cyberdefense
Dossier Bybit : Le plus gros hack de l’histoire de la finance
2025-03-05CyberScoopTim Starks
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement
2025-02-28Intel 471Intel 471
Black Basta exposed: A look at a cybercrime data leak
Black Basta Black Basta
2025-02-27MicrosoftSteven Masada
Disrupting a global cybercrime network abusing generative AI
Storm-2139