Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-08-27AnthropicAnthropic
Anthropic - Threat Intelligence Report: August 2025
BeaverTail OtterCookie GolangGhost InvisibleFerret GolangGhost
2025-08-25GoogleGoogle Threat Intelligence Group
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
PlugX UNC6384
2025-08-25GoogleGoogle Threat Intelligence Group
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
STATICPLUGIN
2025-07-31MicrosoftMicrosoft Threat Intelligence
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
ApolloShadow
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence Through NRD's ( New Registered Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via TLD's ( Top Level Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via GTLD's ( Generic Top Level Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence visa ccTLD ( country code top-level domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence ( Compromised domain list ) via ZoneFiles
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via Newly Registered Domains
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence vis Domain Monitoring ( ccTLD , gTLD , TLD , Malware Zones )
2025-07-22MicrosoftMicrosoft Threat Intelligence
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Storm-2603
2025-06-30MicrosoftMicrosoft Threat Intelligence
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
2025-06-24BridewellBridewell
2025 Cyber Threat Intelligence Report
AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver
2025-06-20Twitter (@threatintel)Threat Intelligence
Tweet about wiper deployed against Albania by Druidfly
2025-06-12InfobloxInfoblox Threat Intelligence Group
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal
DollyWay
2025-06-04GoogleGoogle Threat Intelligence Group
The Cost of a Call: From Voice Phishing to Data Extortion
UNC6040
2025-05-27MicrosoftMicrosoft Threat Intelligence
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Void Blizzard
2025-05-06InfobloxInfoblox Threat Intelligence Group
Telegram Tango: Dancing with a Scammer
2025-04-23MicrosoftMicrosoft Threat Intelligence
Understanding the threat landscape for Kubernetes and containerized assets
Storm-1977