Click here to download all references as Bib-File.•
| 2025-08-27
⋅
Anthropic
⋅
Anthropic - Threat Intelligence Report: August 2025 BeaverTail OtterCookie GolangGhost InvisibleFerret GolangGhost |
| 2025-08-25
⋅
Google
⋅
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats PlugX UNC6384 |
| 2025-08-25
⋅
Google
⋅
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats STATICPLUGIN |
| 2025-07-31
⋅
Microsoft
⋅
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats ApolloShadow |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence Through NRD's ( New Registered Domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence via TLD's ( Top Level Domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence via GTLD's ( Generic Top Level Domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence visa ccTLD ( country code top-level domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence ( Compromised domain list ) via ZoneFiles |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence via Newly Registered Domains |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence vis Domain Monitoring ( ccTLD , gTLD , TLD , Malware Zones ) |
| 2025-07-22
⋅
Microsoft
⋅
Disrupting active exploitation of on-premises SharePoint vulnerabilities Storm-2603 |
| 2025-06-30
⋅
Microsoft
⋅
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations |
| 2025-06-24
⋅
Bridewell
⋅
2025 Cyber Threat Intelligence Report AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver |
| 2025-06-20
⋅
Twitter (@threatintel)
⋅
Tweet about wiper deployed against Albania by Druidfly |
| 2025-06-12
⋅
Infoblox
⋅
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal DollyWay |
| 2025-06-04
⋅
Google
⋅
The Cost of a Call: From Voice Phishing to Data Extortion UNC6040 |
| 2025-05-27
⋅
Microsoft
⋅
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage Void Blizzard |
| 2025-05-06
⋅
Infoblox
⋅
Telegram Tango: Dancing with a Scammer |
| 2025-04-23
⋅
Microsoft
⋅
Understanding the threat landscape for Kubernetes and containerized assets Storm-1977 |