Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-29CrowdStrikeCrowdStrike Threat Intel Team, Rob Bruner
LABYRINTH CHOLLIMA Evolves into Three Adversaries
2026-01-26Trend MicroJoseph C Chen, Ted Lee
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups
PeckBirdy GRAYRABBIT
2025-12-04CrowdStrikeCrowdStrike Counter Adversary Operations
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
BRICKSTORM WARP PANDA
2025-11-19ESET ResearchDávid Gábriš, Facundo Muñoz
PlushDaemon compromises network devices for adversary-in-the-middle attacks
EdgeStepper LittleDaemon
2025-10-14CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Adversaries Target Ukrainian Defence Forces and Local Authorities Using "Counter-Sabotage" Lure
UAC-0239
2025-08-21CrowdStrikeCounter Adversary Operations
MURKY PANDA: A Trusted-Relationship Threat in the Cloud
2025-07-02CrowdStrikeCounter Adversary Operations
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
2025-04-30ESET ResearchFacundo Muñoz
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
TheWizards
2025-04-28SentinelOneAleksandar Milenkoski, Jim Walter, Tom Hegel
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
PurpleHaze
2025-04-02BushidoTokenBushidoToken
Tracking Adversaries: EvilCorp, the RansomHub affiliate
RansomHub
2025-04-01Reversing StoriesHema Loganathan
URSA/MISPADU InfoStealer
Mispadu
2025-02-26OntinueBalazs Greksza, Domenico de Vitto, Manupriya Sharma, Rhys Downing
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations
Black Basta Black Basta
2024-11-19CrowdStrikeCounter Adversary Operations
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector
LIMINAL PANDA
2024-11-18BlackberryBlackBerry Research and Intelligence team
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign
Sync-Scheduler
2024-10-10Hunt.ioHunt.io
Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
Cobalt Strike PlugX
2024-08-27LumenBlack Lotus Labs
Taking the Crossroads: The Versa Director Zero-Day Exploitation
VersaMem
2024-08-02Palo Alto Networks Unit 42Unit 42
Fighting Ursa Luring Targets With Car for Sale
Headlace
2024-07-25SOC PrimeVeronika Telychko
UAC-0057 Attack Detection: A Surge in Adversary Activity Distributing PICASSOLOADER and Cobalt Strike Beacon
Cobalt Strike PicassoLoader Ghostwriter
2024-07-25CrowdStrikeCounter Adversary Operations
Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List
SAMBASPIDER
2024-07-02SekoiaQuentin Bourgue
Exposing FakeBat loader: distribution methods and adversary infrastructure
BlackCat Royal Ransom EugenLoader Carbanak Cobalt Strike DICELOADER Gozi IcedID Lumma Stealer NetSupportManager RAT Pikabot RedLine Stealer SectopRAT Sliver SmokeLoader Vidar