Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-19FBIFBI
PIN Number 20210719-001: Potential for Malicious Cyber Activities to Disrupt the 2020 Tokyo Summer Olympics
2021-07-19Council of the European UnionCouncil of the European Union
China: Declaration by the High Representative on behalf of the European Union urging Chinese authorities to take action against malicious cyber activities undertaken from its territory
APT40
2021-07-19MicrosoftAmy Hogan-Burney, Microsoft Digital Crimes Unit
Fighting an emerging cybercrime trend
2021-07-19CyberArkBen Cohen
FickerStealer: A New Rust Player in the Market
Ficker Stealer
2021-07-19Washington PostEllen Nakashima, John Hudson
U.S., allies accuse China of hacking Microsoft and condoning other cyberattacks (APT40)
2021-07-19THE WHITE HOUSETHE WHITE HOUSE
The United States, Joined by Allies and Partners, Attributes Malicious Cyber Activity and Irresponsible State Behavior to the People’s Republic of China
2021-07-19CISACISA
Alert (AA21-200B): Chinese State-Sponsored Cyber Operations: Observed TTPs
APT40
2021-07-19Government of CanadaGlobal Affairs Canada
Statement on China’s cyber campaigns
APT40
2021-07-19Minister for Foreign Affairs of AustraliaKaren Andrews, Peter Dutton
Australia joins international partners in attribution of malicious cyber activity to China
APT31 APT40 HAFNIUM
2021-07-19Ministry of Foreign Affairs of JapanMinistry of Foreign Affairs of Japan
Cases of cyberattacks including those by a group known as APT40 which the Chinese government is behind (Statement by Press Secretary YOSHIDA Tomoyuki)
APT40
2021-07-19Council of the European UnionCouncil of the European Union
China: Declaration by the High Representative on behalf of the European Union urging Chinese authorities to take action against malicious cyber activities undertaken from its territory
APT31
2021-07-18The GuardianDavid Pegg, Michael Safi, Nina Lakhani, Paul Lewis, Sam Cutler, Stephanie Kirchgaessner
Revealed: leak uncovers global abuse of cyber-surveillance weapon
Chrysaor
2021-07-15CybereasonCybereason Nocturnus
cybereason vs. prometheus ransomware
Hakbit Prometheus
2021-07-15MicrosoftCristin Goodwin
Fighting cyberweapons built by private businesses
2021-07-15ISATom Winston
What is Cyber Threat Intelligence?
2021-07-14Intel 471Intel 471
How cybercriminals create turbulence for the transportation industry
Mount Locker Nefilim
2021-07-08MIT Technology ReviewPatrick Howell O'Neill
Inside the FBI, Russia, and Ukraine’s failed cybercrime investigation
2021-07-06CybereasonTom Fakterman
Cybereason vs. REvil Ransomware: The Kaseya Chronicles
REvil
2021-07-06FPRIJosephine Wolff
Understanding Russia’s Cyber Strategy
2021-07-06Group-IBDmitry Volkov, Stephen Kavanagh
Operation Lyrebird: Group-IB assists INTERPOL in identifying suspect behind numerous cybercrimes worldwide