Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-07-24MandiantConor Quigley, Daniel Kapellmann Zafra, David Mainor, Ryan Serabian
Pro-PRC HaiEnergy Campaign Exploits U.S. News Outlets via Newswire Services to Target U.S. Audiences; Evidence of Commissioned Protests in Washington, D.C.
2023-07-24MandiantConor Quigley, Daniel Kapellmann Zafra, David Mainor, Ryan Serabian
Pro-PRC HaiEnergy Campaign Exploits U.S. News Outlets via Newswire Services to Target U.S. Audiences; Evidence of Commissioned Protests in Washington, D.C.
2023-07-10MandiantJennifer Guzzetta, Matthew McWhirt, Phil Pearce, Thirumalai Natarajan Muthiah
Defend Against the Latest Active Directory Certificate Services Threats
2023-07-10MandiantJennifer Guzzetta, Matthew McWhirt, Phil Pearce, Thirumalai Natarajan Muthiah
Defend Against the Latest Active Directory Certificate Services Threats
2023-07-10MandiantJennifer Guzzetta, Matthew McWhirt, Phil Pearce, Thirumalai Natarajan Muthiah
Defend Against the Latest Active Directory Certificate Services Threats
2023-07-10MandiantJennifer Guzzetta, Matthew McWhirt, Phil Pearce, Thirumalai Natarajan Muthiah
Defend Against the Latest Active Directory Certificate Services Threats
2023-06-01Kaspersky LabsGeorgy Kucherin, Igor Kuznetsov, Leonid Bezvershenko, Valentin Pashkov
Operation Triangulation: iOS devices targeted with previously unknown malware
Operation Triangulation
2023-06-01Kaspersky LabsGeorgy Kucherin, Igor Kuznetsov, Leonid Bezvershenko, Valentin Pashkov
Operation Triangulation: iOS devices targeted with previously unknown malware
Operation Triangulation
2023-06-01Kaspersky LabsGeorgy Kucherin, Igor Kuznetsov, Leonid Bezvershenko, Valentin Pashkov
Operation Triangulation: iOS devices targeted with previously unknown malware
Operation Triangulation
2023-06-01Kaspersky LabsGeorgy Kucherin, Igor Kuznetsov, Leonid Bezvershenko, Valentin Pashkov
Operation Triangulation: iOS devices targeted with previously unknown malware
Operation Triangulation
2023-05-24cybleCyble
Notable DDoS Attack Tools and Services Supporting Hacktivist Operations in 2023
UserSec
2023-05-04SOCRadarSOCRadar
Sandworm Attackers Use WinRAR to Wipe Data from Government Devices
RoarBAT
2023-04-26UptycsUptycs Threat Research
RTM Locker Ransomware as a Service (RaaS) Now Suits Up for Linux Architecture
RTM Locker
2023-04-20VirusTotalVicente Diaz
APT43: An investigation into the North Korean group’s cybercrime operations
2023-04-19MicrosoftJustin Warner, Microsoft Threat Intelligence Center (MSTIC)
Exploring STRONTIUM's Abuse of Cloud Services
FusionDrive
2023-04-19MicrosoftJustin Warner, Microsoft Threat Intelligence Center (MSTIC)
Exploring STRONTIUM's Abuse of Cloud Services
FusionDrive
2023-04-18NCSC UKUnited Kingdom’s National Cyber Security Centre (NCSC-UK)
Jaguar Tooth - Cisco IOS malware that collects device information and enables backdoor access
2023-04-13GOV.PLCERT.PL, Military Counterintelligence Service
HALFRIG - Malware Analysis Report
HALFRIG
2023-04-13GOV.PLCERT.PL, Military Counterintelligence Service
QUARTERRIG - Malware Analysis Report
QUARTERRIG
2023-04-13GOV.PLCERT.PL, Military Counterintelligence Service
SNOWYAMBER - Malware Analysis Report
GraphicalNeutrino