
APT & Cybercriminals Campaign Collection
#Threat Defense#Threat Management
Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.
This is a collection of APT and cybercriminal campaigns
This is a collection of campaigns conducted by APT (Advanced Persistent Threat) groups and cybercriminals.
The Passwords for Malware Samples and Related Threats
The passwords for malware samples may be either 'virus' or 'infected'. For reference, here are some useful resources: kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intelligence concerning APT and cybercriminal groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty.
Evasive Panda utilizes the Monlam Festival to target Tibetan individuals.
When Cats Fly: The suspected Iranian threat actor UNC1549 is targeting the aerospace and defense sectors in Israel and the broader Middle East region.
ConnectWise ScreenConnect attacks are being used to deliver malware.
Inside the I-Soon APT (Earth Lusca) operation center.
Staying ahead of threat actors in the age of AI.
Trend Micro: The Evolution of Cybercrime.