Click here to download all references as Bib-File.•
| 2026-02-25
⋅
Google
⋅
Cloud Threat Horizons Report: H1 2026 UNC6426 |
| 2026-02-09
⋅
TRUESEC
⋅
Detecting Russian Threats to Critical Energy Infrastructure DynoWiper |
| 2026-01-07
⋅
Huntress Labs
⋅
The Great VM Escape: ESXi Exploitation in the Wild |
| 2025-12-08
⋅
Swisscom B2B CSIRT
⋅
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5 Amadey |
| 2025-11-27
⋅
Cleafy
⋅
Albiriox Exposed: A New RAT Mobile Malware Targeting Global Finance and Crypto Wallets Albiriox |
| 2025-10-16
⋅
Swisscom B2B CSIRT
⋅
Swisscom TDR Intel Brief - Acreed: On-Chain C2 Evolution ACR Stealer |
| 2025-09-30
⋅
Google
⋅
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations |
| 2025-09-24
⋅
Google
⋅
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors BRICKSTORM |
| 2025-09-19
⋅
ESET Research
⋅
Gamaredon X Turla collab PteroGraphin |
| 2025-08-27
⋅
TRUESEC
⋅
Tamperedchef – The Bad PDF Editor TamperedChef |
| 2025-08-26
⋅
Google
⋅
Widespread Data Theft Targets Salesforce Instances via Salesloft Drift UNC6395 |
| 2025-08-12
⋅
The New York Times
⋅
Russia Is Suspected to Be Behind Breach of Federal Court Filing System |
| 2025-06-17
⋅
DARKReading
⋅
Operation Endgame: Do Takedowns and Arrests Matter? BumbleBee Emotet Pikabot SmokeLoader TrickBot |
| 2025-05-15
⋅
ESET Research
⋅
Operation RoundPress SpyPress |
| 2025-04-22
⋅
Volexity
⋅
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows UTA0352 UTA0355 |
| 2025-04-03
⋅
Mandiant
⋅
Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) SPAWNSNARE |
| 2025-03-20
⋅
ESET Research
⋅
Operation FishMedley ShadowPad SodaMaster Spyder Earth Lusca FishMedley |
| 2024-12-04
⋅
Cleafy
⋅
DroidBot: Insights from a new Turkish MaaS fraud operation DroidBot |
| 2024-10-23
⋅
Trend Micro
⋅
Unmasking Prometei: A Deep Dive Into Our MXDR Findings Prometei |
| 2024-10-15
⋅
Microsoft
⋅
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack UNC4393 |