Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-02-25Google0verfl0w_, Anton Chuvakin, Bob Mechler, Crystal Lister, Eduardo Mattos, Google, Jason Bisson, Joachim Metz, John Stone, Jorge Blanco, Keith Lunden, Lia Wertheimer, Matthew Siuda, Michael Robinson, Muhammad Muneer, Noah McDonald, Ollie Green, Seth Rosenblatt
Cloud Threat Horizons Report: H1 2026
UNC6426
2026-02-09TRUESECAndreas Törnqvist, Mattias Wåhlén, Nicklas Keijser
Detecting Russian Threats to Critical Energy Infrastructure
DynoWiper
2026-01-07Huntress LabsAnna Pham, Matt Anderson
The Great VM Escape: ESXi Exploitation in the Wild
2025-12-08Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5
Amadey
2025-11-27CleafyAlessandro Strino, Federico Valentini, Gianluca Scotti, Simone Mattia
Albiriox Exposed: A New RAT Mobile Malware Targeting Global Finance and Crypto Wallets
Albiriox
2025-10-16Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom TDR Intel Brief - Acreed: On-Chain C2 Evolution
ACR Stealer
2025-09-30GoogleAswad Robinson, Bhavesh Dhake, Laith Al, Matthew McWhirt, Michael Rudden, Omar ElAhdan
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
2025-09-24GoogleAshley Pearson, Austin Larsen, BRAD SLAYBAUGH, Doug Bienstock, Geoff Carstairs, John Wolfram, Josh Madeley, Josh Murchie, Matt Lin, Sarah Yoder
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
BRICKSTORM
2025-09-19ESET ResearchMatthieu Faou, Zoltán Rusnák
Gamaredon X Turla collab
PteroGraphin
2025-08-27TRUESECAndreas Törnqvist, Mattias Wåhlén, Nicklas Keijser, oscar Wolf
Tamperedchef – The Bad PDF Editor
TamperedChef
2025-08-26GoogleAustin Larsen, Matt Lin, Omar ElAhdan, Tyler McLellan
Widespread Data Theft Targets Salesforce Instances via Salesloft Drift
UNC6395
2025-08-12The New York TimesAdam Goldman, Glenn Thrush, Mattathias Schwartz
Russia Is Suspected to Be Behind Breach of Federal Court Filing System
2025-06-17DARKReadingJames Shank
Operation Endgame: Do Takedowns and Arrests Matter?
BumbleBee Emotet Pikabot SmokeLoader TrickBot
2025-05-15ESET ResearchMatthieu Faou
Operation RoundPress
SpyPress
2025-04-22VolexityCharlie Gardner, Josh Duke, Matthew Meltzer, Sean Koessel, Steven Adair, Tom Lancaster
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows
UTA0352 UTA0355
2025-04-03MandiantJacob Thompson, John Wolfram, Josh Murchie, Matt Lin, Michael Edie
Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)
SPAWNSNARE
2025-03-20ESET ResearchMatthieu Faou
Operation FishMedley
ShadowPad SodaMaster Spyder Earth Lusca FishMedley
2024-12-04CleafyAlessandro Strino, Federico Valentini, Simone Mattia
DroidBot: Insights from a new Turkish MaaS fraud operation
DroidBot
2024-10-23Trend MicroBren Matthew Ebriega, Buddy Tancio, Mohamed Fahmy
Unmasking Prometei: A Deep Dive Into Our MXDR Findings
Prometei
2024-10-15MicrosoftAkash Chaudhuri, Gourav Khandelwal, Krithika Ramakrishnan, Matthew Mesa, Sagar Patil, Uri Oren
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack
UNC4393