Click here to download all references as Bib-File.•
| 2026-01-28
⋅
Google
⋅
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network |
| 2026-01-27
⋅
Google
⋅
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 |
| 2025-12-12
⋅
Google
⋅
Multiple Threat Actors Exploit React2Shell (CVE-2025-55182) ANGRYREBEL MINOCAT SNOWLIGHT Earth Lamia |
| 2025-12-04
⋅
Aryaka Networks
⋅
Scam in the Cloud How Fraudsters Exploit Google Cloud Storage (GCS) for Deceptive Campaigns |
| 2025-11-20
⋅
Google
⋅
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks BADAUDIO Cobalt Strike |
| 2025-10-20
⋅
Google
⋅
To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER MAYBEROBOT NOROBOT YESROBOT |
| 2025-09-30
⋅
Google
⋅
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations |
| 2025-09-24
⋅
Google
⋅
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors BRICKSTORM |
| 2025-09-05
⋅
Arctic Wolf
⋅
GPUGate Malware: Malicious GitHub Desktop Implants Use Hardware-Specific Decryption, Abuse Google Ads to Target Western Europe |
| 2025-08-26
⋅
Google
⋅
Widespread Data Theft Targets Salesforce Instances via Salesloft Drift UNC6395 |
| 2025-08-25
⋅
Google
⋅
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats PlugX UNC6384 |
| 2025-08-25
⋅
Google
⋅
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats STATICPLUGIN |
| 2025-07-08
⋅
Koi Security
⋅
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware. |
| 2025-06-18
⋅
Google
⋅
What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia UNC6293 |
| 2025-06-04
⋅
Google
⋅
The Cost of a Call: From Voice Phishing to Data Extortion UNC6040 |
| 2025-05-28
⋅
Google
⋅
Mark Your Calendar: APT41 Innovative Tactics TOUGHPROGRESS |
| 2025-05-07
⋅
Google
⋅
COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs LOSTKEYS |
| 2025-04-30
⋅
Google Cloud Community
⋅
Finding Malware: Unveiling LUMMAC.V2 with Google Security Operations Lumma Stealer |
| 2025-04-21
⋅
Twitter (@browsercookies)
⋅
Tweet on public Google Drive potentially connected to DPRK activity. |
| 2025-03-31
⋅
GootLoader Wordpress
⋅
Gootloader Returns: Malware Hidden in Google Ads for Legal Documents GootLoader |