1. |
AIVD (Algemene Inlichtingen- en Veiligheidsdienst, Netherlands) |
AIVD-jaarverslag 2022 |
2. |
Amatas |
Cyber Threat Report - January 2023 |
3. |
Amatas |
Cyber Threat Report - February 2023 |
4. |
Amatas |
Cyber Threat Report - March 2023 |
5. |
APPROACH |
Annual Pentest Report 2023 |
6. |
Bank of England |
Thematic findings from the 2022 cyber stress test |
7. |
BlackBerry |
Global Threat Intelligence Report (April 2023) |
8. |
BlackBerry |
From Google Ads Abuse to a Massive Spear-Phishing Campaign Impersonating Spain’s Tax Agency |
9. |
CSIT (Centre for Secure Information Technologies, United Kingdom) |
Northern Ireland Cyber Security Snapshot |
10. |
CSIT (Centre for Secure Information Technologies, United Kingdom) |
UK Cyber security sectoral analysis 2023 |
11. |
CISA (Cybersecurity & Infrastructure Security Agency, United States of America) |
Advisory: APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers |
12. |
CTIVD (Commissie van Toezicht op de Inlichtingen- en Veiligheidsdiensten, the Netherlands) |
Jaarverslag CTIVD 2022 |
13. |
Datadog |
State of Application Security |
14. |
ESET |
Evasive Panda APT group delivers malware via updates for popular Chinese software |
15. |
ESET |
How I (could’ve) stolen your corporate secrets for $100 |
16. |
Google (Google Cybersecurity Action Team - GCAT) |
Threat Horizons: April 2023 Threat Horizons Reports |
17. |
Google (Google Threat Analysis Group - GTAG) |
Ukraine remains Russia’s biggest cyber focus in 2023 |
18. |
HUMAN Security |
2023 Enterprise Bot Fraud Benchmark Report |
19. |
IBM X-Force |
IBM X-Force Threat Activity Reports |
20. |
Infoblox |
Dog Hunt: Finding Decoy Dog Toolkit via Anomalous DNS Traffic |
21. |
Infoblox |
Q4 2022 Cyber Threat Intelligence Report |
22. |
Intel471 |
CVE Weaponization Report |
23. |
Kaspersky |
Tomiris called, they want their Turla malware back |
24. |
Kaspersky |
APT trends report Q1 2023 |
25. |
Mandiant |
M-Trends 2023: Cybersecurity Insights From the Frontlines |
26. |
Menlo Security |
2023 Cyberthreat Defense Report |
27. |
Microsoft |
MERCURY and DEV-1084: Destructive attack on hybrid environment |
28. |
MIVD (Militaire Inlichtingen- en Veiligheidsdienst, the Netherlands) |
Openbaar Jaarverslag 2022 MIVD |
29. |
NCSC (National Cyber Security Centre, United Kingdom) |
Jaguar Tooth |
30. |
Norma Cyber |
2023 Annual Threat Assessment |
31. |
Palo Alto / Unit42 |
Cloud Threat Report: Navigating the Expanding Attack Surface (volume 7) |
32. |
Picus |
CVE-2023-23397: Microsoft Office Outlook Privilege Escalation Vulnerability |
33. |
PWC |
Global Crisis and Resilience Survey 2023 |
34. |
PWC |
Cyber Threats 2022: A Year in Retrospect |
35. |
Qualys |
2023 Qualys TRU Risk Research Report |
36. |
Rezillion |
Do You Know KEV? You Should (Because Hackers Do)! |
37. |
Sophos |
Tax firms targeted by precision malware attacks |
38. |
Talos / Cisco |
State-sponsored campaigns target global network infrastructure |
39. |
Talos / Cisco |
Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities |
40. |
Technoir - Blog of Satharus |
Utilising EDR Tests to Enhance Threat Detection |
41. |
Tesseract Intelligence |
Interesting findings: 18 March - 4 April 2023 |
42. |
Tesseract Intelligence |
Interesting findings: 5 - 19 April 2023 |
43. |
Thales |
2022-2023 : A year of Cyber Conflict in Ukraine |
44. |
The DFIR Report |
Unwrapping Ursnifs Gifts |
45. |
The DFIR Report |
ShareFinder: How Threat Actors Discover File Shares |
46. |
The DFIR Report |
Collect, Exfiltrate, Sleep, Repeat |
47. |
The DFIR Report |
Malicious ISO File Leads to Domain Wide Ransomware |
48. |
The Guardian |
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics |
49. |
Trellix |
Genesis Market No Longer Feeds The Evil Cookie Monster |
50. |
Trellix |
A Royal Analysis of Royal Ransom |
51. |
WiCyS (Women in Cybersecurity) |
The State of Inclusion of Women in Cybersecurity 2023 |