REPORT

DATE

NAME

INFO

CATEGORY

SUBCATE

14.6.25 2024 INTERNET CRIME REPORT 2024 INTERNET CRIME REPORT REPORT REPORT
14.6.25 2023 INTERNET CRIME REPORT 2023 INTERNET CRIME REPORT REPORT REPORT
11.6.25 Salesforce Industry Clouds: Low-Code, High Stakes Salesforce industry clouds are a suite of Salesforce solutions, each of which enables organizations to build industry-specific
applications and workflows in a simplified low-code manner.
REPORT REPORT
10.6.25 Disrupting malicious uses of AI: June 2025 Our mission is to ensure that artificial general intelligence benefits all of humanity. We advance this mission by deploying our innovations to build AI tools that help people solve really hard problems. REPORT REPORT
8.6.25 REVIEW OF THE ATTACKS ASSOCIATED WITH LAPSUS$ AND RELATED THREAT GROUPS Beginning in late 2021 and continuing late into 2022, a globally active, extortion-focused cyber threat actor group attacked dozens of well-known companies and government agencies around the world. REPORT REPORT
8.6.25 Infostealer Pipeline The Infostealer Pipeline: How Russian Market Fuels Credential-Based Attacks REPORT REPORT
5.6.25 BitterAPT Revisited: the
Untold Evolution of an Android
Espionage Tool
In 2016, a sophisticated malware campaign targeting Pakistani nationals made headlines. Dubbed Bitter[4], the Advanced Persistent Threat group (also known as APT-C-08 [5]) has been active both in desktop and mobile malware campaigns for quite a long time, as their activity seems to date back to 2014. REPORT REPORT
1.6.25 Infrastructure Used to Manage Domains Related to Cryptocurrency Investment Fraud Scams between October 2023 and April 2025 The Federal Bureau of Investigation (FBI) is releasing this FLASH to disseminate indicators of compromise (IOCs) associated with malicious cyber activities linked to Funnull Technology Inc. (Funnull). REPORT REPORT
1.6.25 NodeSnake Malware Campaign Threat Intelligence NodeSnake Malware Campaign REPORT REPORT
5.6.25 BitterAPT Revisited: the
Untold Evolution of an Android
Espionage Tool
In 2016, a sophisticated malware campaign targeting Pakistani nationals made headlines. Dubbed Bitter[4], the Advanced Persistent Threat group (also known as APT-C-08 [5]) has been active both in desktop and mobile malware campaigns for quite a long time, as their activity seems to date back to 2014. REPORT REPORT
25.5.25 Silent Ransom Group Targeting Law Firm The cyber threat actor Silent Ransom Group (SRG), also known as Luna Moth, Chatty Spider, and UNC3753, is targeting law firms using information technology (IT) themed social engineering calls, and callback phishing emails, to gain remote access to systems or devices and steal sensitive data to extort the victims REPORT REPORT
25.5.25 Russian GRU Targeting Western Logistics Entities and Technology Companies This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber
campaign targeting Western logistics entities and technology companies
REPORT REPORT
22.5.25 Russian GRU Targeting Western Logistics Entities and Technology Compani This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. REPORT REPORT
20.5.25 ESET APT Activity Report Q4 2024–Q1 2025 An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025 REPORT REPORT

4.5.24

Hello 0-Days My Old Frien : A 2024 Zero-Day
Exploitation Analysis

This report describes what Google Threat Intelligence Group (GTIG) knows about zero-day exploitation in 2024.

REPORT

REPORT

4.5.24

TARGETING AND COMPROMISE OF FRENCH ENTITIES USING THE APT28 INTRUSION S

ACTIVITIES ASSOCIATED WITH APT28 SINCE 2021

REPORT

REPORT

3.5.24 FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure The FortiGuard Incident Response (FGIR) team recently investigated a long-term cyber intrusion targeting critical national infrastructure (CNI) in the Middle East, attributed to an Iranian state-sponsored threat group. The attack involved extensive espionage operations and suspected network prepositioning—a tactic often used to maintain persistent access for future strategic advantage. REPORT REPORT
26.4.25 FBI INTERNET CRIME REPORT This year marks the 25th anniversary of the FBI’s Internet Crime Complaint Center, or IC3. Originally intended to serve the law enforcement community, IC3 has evolved to become the primary destination for the public to report cyber-enabled crime and fraud as well as a key source for information on scams and cyber threats REPORT REPORT
23.4.25 M-Trends 2025 A key takeaway from M-Trends 2025 is that attackers are seizing every opportunity to further their objectives. REPORT REPORT
23.2.25 Cyber Threat Intelligence Annual Report 2024 Reflecting on the cyber security landscape of 2024, it is evident that the challenges organisations faced were unprecedented in scale and complexity REPORT REPORT
22.2.25 ThreatLabz 2024_Encrypted Attacks Report Encryption is a cornerstone of cybersecurity, safeguarding sensitive data and ensuring privacy in our increasingly interconnected world. REPORT REPORT

31.8.24

AA24-242A #StopRansomware: RansomHub Ransomware#StopRansomware: RansomHub RansomwareREPORTRansomware

29.8.24

AA24-241A Iran-based Cyber Actors Enabling Ransomware Attacks on US OrganizationsIran-based Cyber Actors Enabling
Ransomware Attacks on US Organizations
REPORTREPORT

24.7.24

Volt TyphoonII

A secret Disinformation Campaign targetingU.S.Congress and Taxpayers conductedbyU.S.Government agencies

REPORT

REPORT

20.7.24

CHINA’S CYBER REVENGEWHY THE PRC FAILS TO BACK ITS CLAIMS OF WESTERN ESPIONAGEREPORTREPORT

19.7.24

SnowflakeWe have released our Snowflake threat hunting guide, which contains guidance and queries for detecting abnormal and malicious activity across Snowflake customer database instances. REPORTREPORT
17.6.24Unfading Sea HazeDeep Dive into the Unfading Sea Haze A technical look at a threat actor’s ever-evolving tools and tacticsREPORTREPORT

7.6.24

Ransomware Trends 2024

Veeam’s goal is to relentlessly advance data and cyber resilience to keep your business running.

REPORT

REPORT

31.5.24

AI and Covert Influence Operations:
Latest Trends
OpenAI is committed to enforcing policies that prevent abuse and to improving transparency around AI-generated content.REPORTAI
30.4.24MUDDLING MEERKAT:
THE GREAT FIREWALL
MANIPULATOR
THE GREAT FIREWALL MANIPULATORREPORTREPORT
17.4.24Connect:funDetailing an exploitation campaign targeting FortiClient EMS via CVE-2023-48788REPORTREPORT
5.3.24BEWARE THE SHALLOW
WATERS: SAVVY
SEAHORSE LURES VICTIMS
TO FAKE INVESTMENT
PLATFORMS THROUGH
FACEBOOK ADS
DNS threat actors never cease to surprise us. Every day, we learn about creative, new campaigns they have devised to exploit victims. Investment scams are one of these. The US Federal Trade Commission reported that more money was lost to investment scams in the US during 2023 than any other type of scam, totaling over USD $4.6 billion dollars stolen from victimsREPORTREPORT
4.3.24ShadowBankinginYour Pocket:ExposingAndroidApp UsedbyMoneyMulesA money mule refers to an individual enlisted to receive and transfer funds acquired through fraudulent activities. This role is pivotal in the execution of various financial crimes, such as cyber fraud or money laundering. Importantly, the involvement of money mules introduces an additional layer of complexity, making it challenging for law enforcement to trace the origins of illicit transactions.REPORTREPORT

28.2.24

Russian Cyber Actors Use Compromised Routers to
Facilitate Cyber Operation
Actions EdgeRouter network defenders and users should implement to protect against APT28 activityREPORTREPORT
21.2.24Tool of First ResortIsrael-Hamas War in CyberREPORTREPORT
1.2.242023 Adversary Infrastructure Report 2023 Adversary Infrastructure ReportREPORTReport