Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-03-04WeixinHunting Shadow Lab
Shadow Hunting: Analysis of APT37’s attack activities against South Korea using North Korean political topics
2023-07-26WeixinAnheng Threat Intelligence Center
APT29 recently faked the German embassy and issued a malicious PDF file
BEATDROP Unidentified 107 (APT29)
2022-08-15WeixinKnow Chuangyu
Analysis of the characteristics of new activities organized by Patchwork APT in South Asia
2022-08-10WeixinRed Raindrop Team
Operation(верность) mercenary: a torrent of steel trapped in the plains of Eastern Europe
BumbleBee Cobalt Strike
2022-07-13WeixinAntiy CERT
Confucius: The Angler Hidden Under CloudFlare
Quasar RAT
2022-05-18Weixin360 Threat Intelligence Center
filesyncshell.dll hijacked? APT-C-24 Sidewinder Briefing on the Latest Attack Activity
2022-03-30WeixinQAX Virus Response Center
VajraEleph, a Vajra elephant group from South Asia, reveals cyber espionage campaign against Pakistani military personnel
2022-02-23Weixin360 Threat Intelligence Center
APT-C-58 (Gorgon Group) attack warning
Agent Tesla
2019-12-04WeixinGcow Security Team
Tentacles reaching Central Asia: analysis of Uzbekistan activities by DustSquad APT
Antiy releases analysis report of "Formula Organization" attack on Middle East SWIFT service providers
"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed
Cobalt Strike SOUNDBITE
URLZone: Analysis of Suspected Attacks Against Japanese Hi-Tech Enterprise Employees