Click here to download all references as Bib-File.•
| 2025-01-30
            
            ⋅
            
            Bitdefender
            ⋅
            
             UAC-0063: Cyber Espionage Operation Expanding from Central Asia HATVIBE  | 
| 2025-01-30
            
            ⋅
            
            Department of Justice
            ⋅
            
             Cybercrime websites selling hacking tools to transnational organized crime groups seized  | 
| 2025-01-21
            
            ⋅
            
            Trend Micro
            ⋅
            
             Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions Cobalt Strike HemiGate ShadowPad SNAPPYBEE SparrowDoor UNC4841  | 
| 2025-01-15
            
            ⋅
            
            
            ⋅
            
            CTFIOT
            ⋅
            
             Article 113: One of the Russian-Ukrainian cyberwars, a review of the first major blackout in Ukraine caused by the Sandworm APT organization KillDisk  | 
| 2025-01-15
            
            ⋅
            
            
            ⋅
            
            Habr
            ⋅
            
             F.A.C.C.T. found new attacks of pro-Ukrainian cyber spies Sticky Werewolf Ozone RAT  | 
| 2025-01-14
            
            ⋅
            
            The Record
            ⋅
            
             Russia's largest platform for state procurement hit by cyberattack from pro-Ukraine group  | 
| 2025-01-13
            
            ⋅
            
            Sekoia
            ⋅
            
             Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations HATVIBE  | 
| 2025-01-13
            
            ⋅
            
            Sekoia
            ⋅
            
             Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations HATVIBE  | 
| 2025-01-08
            
            ⋅
            
            CISO Series
            ⋅
            
             Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details Natohub  | 
| 2025-01-07
            
            ⋅
            
            SOCRadar
            ⋅
            
             Turla Cyber Campaign Targeting Pakistan’s Critical Infrastructure  | 
| 2025-01-03
            
            ⋅
            
             RATs on the island (Remote Access Trojans in Sri Lanka's Cybersecurity Landscape) AsyncRAT Quasar RAT Remcos  | 
| 2024-12-31
            
            ⋅
            
            SOCRadar
            ⋅
            
             Dark Web Profile: Gamaredon APT - SOCRadar® Cyber Intelligence Inc.  | 
| 2024-12-30
            
            ⋅
            
            Medium TRAC Labs
            ⋅
            
             Advancing Through the Cyberfront, LegionLoader Commander Satacom  | 
| 2024-12-28
            
            ⋅
            
            
            ⋅
            
            CERT.AZ
            ⋅
            
             Report on Cyber Threat Groups targeting Azerbaijan  | 
| 2024-12-23
            
            ⋅
            
            FBI
            ⋅
            
             FBI, DC3, and NPA Identification of North Korean Cyber Actors, Tracked as TraderTraitor, Responsible for Theft of $308 Million USD from Bitcoin.DMM.com  | 
| 2024-12-20
            
            ⋅
            
            Twitter (@CERTCyberdef)
            ⋅
            
             Tweet on Emmenhtal v2 Emmenhtal  | 
| 2024-12-18
            
            ⋅
            
            Claroty
            ⋅
            
             Inside a New Cyberweapon: IOCONTROL elf.iocontrol  | 
| 2024-12-18
            
            ⋅
            
            Kaspersky Labs
            ⋅
            
             Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations Babuk LockBit Revenge RAT SparkRAT Cyber Alliance Ukrainian Cyber Alliance  | 
| 2024-12-18
            
            ⋅
            
            KELA
            ⋅
            
             Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives?  | 
| 2024-12-17
            
            ⋅
            
            Cybereason
            ⋅
            
             Your Data Is Under New Lummanagement: The Rise of LummaStealer Lumma Stealer  |