Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-04-07MicrosoftMicrosoft Threat Intelligence
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
2026-03-18GoogleGoogle Threat Intelligence Group
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
GHOSTBLADE
2026-03-06MicrosoftMicrosoft Threat Intelligence
AI as tradecraft: How threat actors operationalize AI
OtterCookie
2026-03-03GoogleGoogle Threat Intelligence Group
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Coruna
2026-03-03GoogleGoogle Threat Intelligence Group
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Coruna UNC6353 UNC6691
2026-02-19GitLabOliver Smith
GitLab Threat Intelligence Team reveals North Korean tradecraft
BeaverTail OtterCookie Contagious Interview
2026-01-28AccentureAccenture Cyber Threat Intelligence
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool
RustyRocket
2026-01-28GoogleGoogle Threat Intelligence Group
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
2026-01-27GoogleGoogle Threat Intelligence Group
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
2026-01-14MicrosoftMicrosoft Threat Intelligence
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
2025-12-15AmazonCJ Moses
Amazon Threat Intelligence identifies Russian cyber threat group targeting Western critical infrastructure
2025-12-01LinkedIn (Microsoft)Microsoft Threat Intelligence
Post about Phishing Campaign pushing XWorm
XWorm TA584
2025-11-19AmazonCJ Moses
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare
2025-11-05GoogleGoogle Threat Intelligence Group
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
PromptLock UNC1069
2025-10-09MicrosoftMicrosoft Threat Intelligence
Investigating targeted “payroll pirate” attacks affecting US universities
Storm-2657
2025-10-06MicrosoftMicrosoft Threat Intelligence
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
Medusa Storm-1175
2025-10-01heavyscientist
Aisuru DDoS Campaign: Threat Intelligence Assessment
Aisuru
2025-09-30InfobloxInfoblox Threat Intelligence Group
Detour Dog: DNS Malware Powers Strela Stealer Campaigns
StrelaStealer
2025-09-16HUMANAdam Sell, Joao Marques, João Santos, Lindsay Kaye, Louisa Abel, Vikas Parthasarathy
Satori Threat Intelligence Alert: SlopAds Covers Fraud with Layers of Obfuscation
SlopAds
2025-09-16InfobloxInfoblox Threat Intelligence Group
Deniability by Design: DNS-Driven Insights into a Malicious Ad Network