REPORT
DATE | NAME | INFO | CATEGORY | SUBCATE |
14.6.25 | 2024 INTERNET CRIME REPORT | 2024 INTERNET CRIME REPORT | REPORT | REPORT |
14.6.25 | 2023 INTERNET CRIME REPORT | 2023 INTERNET CRIME REPORT | REPORT | REPORT |
11.6.25 | Salesforce Industry Clouds: Low-Code, High Stakes |
Salesforce industry clouds are a suite of Salesforce
solutions, each of which enables organizations to build industry-specific applications and workflows in a simplified low-code manner. |
REPORT | REPORT |
10.6.25 | Disrupting malicious uses of AI: June 2025 | Our mission is to ensure that artificial general intelligence benefits all of humanity. We advance this mission by deploying our innovations to build AI tools that help people solve really hard problems. | REPORT | REPORT |
8.6.25 | REVIEW OF THE ATTACKS ASSOCIATED WITH LAPSUS$ AND RELATED THREAT GROUPS | Beginning in late 2021 and continuing late into 2022, a globally active, extortion-focused cyber threat actor group attacked dozens of well-known companies and government agencies around the world. | REPORT | REPORT |
8.6.25 | Infostealer Pipeline | The Infostealer Pipeline: How Russian Market Fuels Credential-Based Attacks | REPORT | REPORT |
5.6.25 |
BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool |
In 2016, a sophisticated malware campaign targeting Pakistani nationals made headlines. Dubbed Bitter[4], the Advanced Persistent Threat group (also known as APT-C-08 [5]) has been active both in desktop and mobile malware campaigns for quite a long time, as their activity seems to date back to 2014. | REPORT | REPORT |
1.6.25 | Infrastructure Used to Manage Domains Related to Cryptocurrency Investment Fraud Scams between October 2023 and April 2025 | The Federal Bureau of Investigation (FBI) is releasing this FLASH to disseminate indicators of compromise (IOCs) associated with malicious cyber activities linked to Funnull Technology Inc. (Funnull). | REPORT | REPORT |
1.6.25 | NodeSnake Malware Campaign | Threat Intelligence NodeSnake Malware Campaign | REPORT | REPORT |
5.6.25 |
BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool |
In 2016, a sophisticated malware campaign targeting Pakistani nationals made headlines. Dubbed Bitter[4], the Advanced Persistent Threat group (also known as APT-C-08 [5]) has been active both in desktop and mobile malware campaigns for quite a long time, as their activity seems to date back to 2014. | REPORT | REPORT |
25.5.25 | Silent Ransom Group Targeting Law Firm | The cyber threat actor Silent Ransom Group (SRG), also known as Luna Moth, Chatty Spider, and UNC3753, is targeting law firms using information technology (IT) themed social engineering calls, and callback phishing emails, to gain remote access to systems or devices and steal sensitive data to extort the victims | REPORT | REPORT |
25.5.25 | Russian GRU Targeting Western Logistics Entities and Technology Companies |
This joint cybersecurity advisory (CSA) highlights a Russian
state-sponsored cyber campaign targeting Western logistics entities and technology companies |
REPORT | REPORT |
22.5.25 | Russian GRU Targeting Western Logistics Entities and Technology Compani | This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. | REPORT | REPORT |
20.5.25 | ESET APT Activity Report Q4 2024–Q1 2025 | An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025 | REPORT | REPORT |
4.5.24 |
Hello 0-Days My Old Frien : A 2024 Zero-Day |
This report describes what Google Threat Intelligence Group (GTIG) knows about zero-day exploitation in 2024. |
REPORT |
|
4.5.24 |
TARGETING AND COMPROMISE OF FRENCH ENTITIES USING THE APT28 INTRUSION S |
ACTIVITIES ASSOCIATED WITH APT28 SINCE 2021 |
REPORT |
|
3.5.24 | FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure | The FortiGuard Incident Response (FGIR) team recently investigated a long-term cyber intrusion targeting critical national infrastructure (CNI) in the Middle East, attributed to an Iranian state-sponsored threat group. The attack involved extensive espionage operations and suspected network prepositioning—a tactic often used to maintain persistent access for future strategic advantage. | REPORT | REPORT |
26.4.25 | FBI INTERNET CRIME REPORT | This year marks the 25th anniversary of the FBI’s Internet Crime Complaint Center, or IC3. Originally intended to serve the law enforcement community, IC3 has evolved to become the primary destination for the public to report cyber-enabled crime and fraud as well as a key source for information on scams and cyber threats | REPORT | REPORT |
23.4.25 | M-Trends 2025 | A key takeaway from M-Trends 2025 is that attackers are seizing every opportunity to further their objectives. | REPORT | REPORT |
23.2.25 | Cyber Threat Intelligence Annual Report 2024 | Reflecting on the cyber security landscape of 2024, it is evident that the challenges organisations faced were unprecedented in scale and complexity | REPORT | REPORT |
22.2.25 | ThreatLabz 2024_Encrypted Attacks Report | Encryption is a cornerstone of cybersecurity, safeguarding sensitive data and ensuring privacy in our increasingly interconnected world. | REPORT | REPORT |
31.8.24 | AA24-242A #StopRansomware: RansomHub Ransomware | #StopRansomware: RansomHub Ransomware | REPORT | Ransomware |
29.8.24 | AA24-241A Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations | Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations | REPORT | REPORT |
24.7.24 | A secret Disinformation Campaign targetingU.S.Congress and Taxpayers conductedbyU.S.Government agencies | REPORT | ||
20.7.24 | CHINA’S CYBER REVENGE | WHY THE PRC FAILS TO BACK ITS CLAIMS OF WESTERN ESPIONAGE | REPORT | REPORT |
19.7.24 | Snowflake | We have released our Snowflake threat hunting guide, which contains guidance and queries for detecting abnormal and malicious activity across Snowflake customer database instances. | REPORT | REPORT |
17.6.24 | Unfading Sea Haze | Deep Dive into the Unfading Sea Haze A technical look at a threat actor’s ever-evolving tools and tactics | REPORT | REPORT |
7.6.24 | Veeam’s goal is to relentlessly advance data and cyber resilience to keep your business running. | REPORT | ||
31.5.24 | AI and Covert Influence Operations: Latest Trends | OpenAI is committed to enforcing policies that prevent abuse and to improving transparency around AI-generated content. | REPORT | AI |
30.4.24 | MUDDLING MEERKAT: THE GREAT FIREWALL MANIPULATOR | THE GREAT FIREWALL MANIPULATOR | REPORT | REPORT |
17.4.24 | Connect:fun | Detailing an exploitation campaign targeting FortiClient EMS via CVE-2023-48788 | REPORT | REPORT |
5.3.24 | BEWARE THE SHALLOW WATERS: SAVVY SEAHORSE LURES VICTIMS TO FAKE INVESTMENT PLATFORMS THROUGH FACEBOOK ADS | DNS threat actors never cease to surprise us. Every day, we learn about creative, new campaigns they have devised to exploit victims. Investment scams are one of these. The US Federal Trade Commission reported that more money was lost to investment scams in the US during 2023 than any other type of scam, totaling over USD $4.6 billion dollars stolen from victims | REPORT | REPORT |
4.3.24 | ShadowBankinginYour Pocket:ExposingAndroidApp UsedbyMoneyMules | A money mule refers to an individual enlisted to receive and transfer funds acquired through fraudulent activities. This role is pivotal in the execution of various financial crimes, such as cyber fraud or money laundering. Importantly, the involvement of money mules introduces an additional layer of complexity, making it challenging for law enforcement to trace the origins of illicit transactions. | REPORT | REPORT |
28.2.24 | Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operation | Actions EdgeRouter network defenders and users should implement to protect against APT28 activity | REPORT | REPORT |
21.2.24 | Tool of First Resort | Israel-Hamas War in Cyber | REPORT | REPORT |
1.2.24 | 2023 Adversary Infrastructure Report | 2023 Adversary Infrastructure Report | REPORT | Report |