Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-03-18GoogleGoogle Threat Intelligence Group
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
GHOSTBLADE
2026-03-03GoogleGoogle Threat Intelligence Group
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Coruna
2026-03-03GoogleGoogle Threat Intelligence Group
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Coruna UNC6353 UNC6691
2026-01-28GoogleGoogle Threat Intelligence Group
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
2026-01-27GoogleGoogle Threat Intelligence Group
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
2025-11-05GoogleGoogle Threat Intelligence Group
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
PromptLock UNC1069
2025-08-25GoogleGoogle Threat Intelligence Group
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
PlugX UNC6384
2025-08-25GoogleGoogle Threat Intelligence Group
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
STATICPLUGIN
2025-06-04GoogleGoogle Threat Intelligence Group
The Cost of a Call: From Voice Phishing to Data Extortion
UNC6040