Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-01-14The RecordDaryna Antoniuk
Russia's largest platform for state procurement hit by cyberattack from pro-Ukraine group
2025-01-13SekoiaAmaury G., Erwan Chevalier, Félix Aime, Maxime A.
Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations
HATVIBE
2025-01-13SekoiaAmaury G., Erwan Chevalier, Félix Aime, Maxime A.
Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations
HATVIBE
2025-01-08CISO SeriesRich Stroffolino
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details
Natohub
2025-01-07SOCRadarAmeer Onwa
Turla Cyber Campaign Targeting Pakistan’s Critical Infrastructure
2025-01-03Nimantha Deshappriya
RATs on the island (Remote Access Trojans in Sri Lanka's Cybersecurity Landscape)
AsyncRAT Quasar RAT Remcos
2024-12-31SOCRadarSOCRadar
Dark Web Profile: Gamaredon APT - SOCRadar® Cyber Intelligence Inc.
2024-12-30Medium TRAC LabsTRAC Labs
Advancing Through the Cyberfront, LegionLoader Commander
Satacom
2024-12-23FBIDC3, FBI, NPA
FBI, DC3, and NPA Identification of North Korean Cyber Actors, Tracked as TraderTraitor, Responsible for Theft of $308 Million USD from Bitcoin.DMM.com
2024-12-20Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v2
Emmenhtal
2024-12-18Kaspersky LabsKaspersky
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations
Babuk LockBit Revenge RAT SparkRAT Ukrainian Cyber Alliance
2024-12-18KELAKELA’s Research Team
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives?
2024-12-17CybereasonElena Odier, Gal Romano, Hema Loganathan, Ralph Villanueva
Your Data Is Under New Lummanagement: The Rise of LummaStealer
Lumma Stealer
2024-12-12Hunt.ioHunt.io
Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime Actors
Broomstick
2024-12-12XLabXLab Team
Glutton: A New Zero-Detection PHP Backdoor from Winnti Targets Cybercrimals
Winnti Glutton
2024-12-07Cert-UACert-UA
Targeted cyberattacks UAC-0185 in relation to the Defense Forces and enterprises of defense systems of Ukraine (CRT-UA#12414)
UAC-0185
2024-12-05LinkedIn (Idan Tarab)Idan Tarab
The Diplomatic Deception: Patchwork’s Use of Fake U.S. Embassy Alerts in Cyber Espionage
2024-12-05Orange CyberdefenseAlexandre Matousek, Marine PICHON
Edam Dropper
Edam Emmenhtal
2024-11-26Reco AIGal Nakash
Stealth in the Cloud: How APT36's ElizaRAT is Redefining Cyber Espionage
ElizaRAT Operation C-Major
2024-11-25Trend MicroLenart Bermejo, Leon M Chang, Ted Lee, Theo Chen
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
SNAPPYBEE