Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-17KELAKELA Cyber Intelligence Center
ByteToBreach: A Deep Dive into a Persistent Data Leak Operator
ByteToBreach
2025-11-13AnthropicAnthropic
Disrupting the first reported AI-orchestrated cyber espionage campaign
GTG-1002
2025-11-13Israel National Digital AgencyAdi Pick, Hila David, Idan Beit-Yosef, Shimi Cohen, Yaniv Goldman
SpearSpecter: Unmasking Iran’s IRGC Cyber Operations Targeting High-Profile Individuals
TAMECAT
2025-11-05nvisoMaxime Thiebaut
Decoding VShell: Insights into a Chinese-Language Cyber Espionage Tool
VShell
2025-11-04The RecordJonathan Greig
Treasury sanctions 8 for laundering North Korea earnings from cybercrime, IT worker scheme
2025-11-03Breached CompanyBreached Company
When the Defenders Become the Attackers: Cybersecurity Experts Indicted for BlackCat Ransomware Operations
BlackCat BlackCat
2025-10-22Multilateral Sanctions Monitoring TeamMultilateral Sanctions Monitoring Team
The DPRK's Violation and Evasion of UN Sanctions through Cyber and Information Technology Worker Activities
2025-10-22Trend MicroDaniel Lunghi, Joseph C Chen, Lenart Bermejo, Leon M Chang, Vickie Su
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns
Cobalt Strike DracuLoader ShadowPad Earth Naga
2025-10-19CNCERTCNCERT
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks
DanderSpritz
2025-10-16QualysDiksha Ojha
F5 BIG-IP Source Code Leaked in State-Linked Cyberattack (BRICKSTORM Malware)
BRICKSTORM
2025-10-10Security AffairsPierluigi Paganini
Ukraine sees surge in AI-Powered cyberattacks by Russia-linked Threat Actors
WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227
2025-10-08CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
New cyber threats: who and how to attack enemy groups
WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227
2025-10-08Cyfirmacyfirma
CYBER THREAT LANDSCAPE REPORT – UNITED ARAB EMIRATES (UAE)
Kazu
2025-10-07CybernewsErnestas Naprys
Steam, Riot Games hit by disruptions: massive DDoS attack suspected
Aisuru
2025-10-02Cisco TalosJoey Chen
UAT-8099: Chinese-speaking cybercrime group targets high-value IIS for SEO fraud
Cobalt Strike IISpy UAT-8099
2025-10-02Security AffairsPierluigi Paganini
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories
Crimson Collective
2025-10-02CyberSecurityNewsGuru Baran
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
Crimson Collective
2025-09-30GoogleAswad Robinson, Bhavesh Dhake, Laith Al, Matthew McWhirt, Michael Rudden, Omar ElAhdan
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
2025-09-30CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Russian Cyber Operations
WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer
2025-09-09Positive TechnologiesViktor Kazakov
Phantom pains: a large-scale cyberespionage campaign and a possible split within the PhantomCore APT group
PhantomCore