Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-30WeixinQAX Virus Response Center
VajraEleph, a Vajra elephant group from South Asia, reveals cyber espionage campaign against Pakistani military personnel
VajraSpy
2022-03-28Cert-UACert-UA
UAC-0056 cyberattack on Ukrainian state authorities using GraphSteel and GrimPlant malware (CERT-UA#4293)
GraphSteel GrimPlant SaintBear
2022-03-28Cyber Geeks (CyberMasterV)Vlad Pasca
A Step-by-Step Analysis of the Russian APT Turla Backdoor called TinyTurla
TinyTurla
2022-03-25TrustwaveTrustwave SpiderLabs
Cyber Attackers Leverage Russia-Ukraine Conflict in Multiple Spam Campaigns
Remcos
2022-03-25GOV.UAState Service of Special Communication and Information Protection of Ukraine (CIP)
Who is behind the Cyberattacks on Ukraine's Critical Information Infrastructure: Statistics for March 15-22
Xloader Agent Tesla CaddyWiper Cobalt Strike DoubleZero GraphSteel GrimPlant HeaderTip HermeticWiper IsaacWiper MicroBackdoor Pandora RAT
2022-03-25Department of JusticeDepartment of Justice
Cybercriminal Connected to Multimillion Dollar Ransomware Attacks Sentenced for Online Fraud Schemes
2022-03-24Government of United KingdomGovernment of United Kingdom
UK exposes Russian spy agency behind cyber incidents
2022-03-24CISAUS-CERT
Alert (AA22-083A) Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector
Havex RAT Triton
2022-03-24Lab52freyit
Another cyber espionage campaign in the Russia-Ukrainian ongoing cyber attacks
Quasar RAT
2022-03-24Cyber Security NewsGurubaran
GIMMICK Malware Attacks macOS to Attack Organizations Across Asia
GIMMICK
2022-03-24NextGovBrandi Vincent
Ukrainian Cyber Lead Says ‘At Least 4 Types of Malware’ in Use to Target Critical Infrastructure and Humanitarian Aid
CaddyWiper DoubleZero HermeticWiper IsaacWiper
2022-03-23PythonBytesIan Hellen
Tracking cyber intruders with Jupyter and Python
2022-03-23MandiantDan Scott, Elias fox, Gary Freas, Jeffery Johnson, Michael Barnhart, Michelle Cantos
Not So Lazarus: Mapping DPRK Cyber Threat Groups to Government Organizations
2022-03-22Rewterz Information SecurityRewterz Information Security
Russian-Ukrainian Cyber Warfare – Rewterz Threat Intelligence Rollup
NB65
2022-03-22360 Threat Intelligence Center360 Threat Intelligence Center
Quantum Attack System – NSA "APT-C-40" Hacking Organization High-end Cyber Attack Weapon Technical Analysis Report (I)
2022-03-22Cert-UACert-UA
Uac-0026 cyberattack using HeaderTip malware (CERT-UA#4244)
HeaderTip
2022-03-22Cert-UACert-UA
Cyberattack on Ukrainian enterprises using the DoubleZero destructor program (CERT-UA # 4243)
DoubleZero
2022-03-17Cert-UACert-UA
UAC-0020 (Vermin) cyberattack on Ukrainian state organizations using the SPECTR malware (CERT-UA#4207)
2022-03-17CISAUS-CERT
Alert (AA22-076A) Strengthening Cybersecurity of SATCOM Network Providers and Customers
2022-03-17Digital ShadowsPhoton Research Team
Meet Lapsus$: An Unusual Group in the Cyber Extortion Business