Click here to download all references as Bib-File.•
2025-06-19
⋅
Government of Canada
⋅
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign |
2025-06-16
⋅
Orange Cyberdefense
⋅
From SambaSpy to Sorillus: Dancing through a multi-language phishing campaign in Europe Sorillus RAT |
2025-06-10
⋅
Check Point Research
⋅
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage Horus |
2025-05-27
⋅
AIVD
⋅
AIVD and MIVD identify new Russian cyber threat actor |
2025-05-21
⋅
Microsoft
⋅
Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool Lumma Stealer |
2025-05-07
⋅
FBI
⋅
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities TheMoon |
2025-05-07
⋅
FBI
⋅
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers TheMoon |
2025-05-07
⋅
Palo Alto Networks Unit 42
⋅
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation APT35 |
2025-05-06
⋅
NCSC Switzerland
⋅
Cybersecurity: Situation in Switzerland and internationally - Semi-Annual Report 2024/II |
2025-05-06
⋅
Mandiant
⋅
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines BlackCat DragonForce RansomHub |
2025-05-06
⋅
Mandiant
⋅
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines BlackCat DragonForce RansomHub |
2025-04-29
⋅
⋅
France Diplomatie
⋅
Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025) |
2025-04-28
⋅
SentinelOne
⋅
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries PurpleHaze |
2025-04-25
⋅
Twitter (@teamcymru_S2)
⋅
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure |
2025-04-23
⋅
Trend Micro
⋅
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations BeaverTail FrostyFerret GolangGhost InvisibleFerret GolangGhost WageMole |
2025-04-15
⋅
⋅
Orange Cyberdefense
⋅
CyberSOC Insights: Analysis of a Black Basta Attack Campaign Black Basta DarkGate Lumma Stealer |
2025-04-15
⋅
sysdig
⋅
UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell SNOWLIGHT Sliver Vshell |
2025-04-15
⋅
SecurityWeek
⋅
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games |
2025-04-12
⋅
CyberSecurity88
⋅
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack MORH4x |
2025-04-09
⋅
Resecurity
⋅
Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach Jabaroot |