ENISA THREAT LANDSCAPE 2024
Image Description
Common Information
Type Value
UUID 2495676b-2fb0-4f65-b00b-0ce70273a550
Fingerprint 28b9cb3f8b12bac1ccae84ef1b36b74dfa5c53a3594e8634905c60e6f7ba1821
Analysis status DONE
Considered CTI value 2
Text language
Published Sept. 17, 2024, 5:58 p.m.
Added to db Sept. 19, 2024, 7:07 p.m.
Last updated Sept. 19, 2024, 7:16 p.m.
Headline ENISA THREAT LANDSCAPE 2024
Title ENISA THREAT LANDSCAPE 2024
Detected Hints/Tags/Attributes 858/4/770
Attributes
Details Type #Events CTI Value
Details CVE 53
cve-2023-42793
Details CVE 2
cve-2023-233397
Details CVE 117
cve-2023-2868
Details CVE 31
cve-2023-34048
Details CVE 55
cve-2023-46747
Details CVE 38
cve-2024-3400
Details CVE 67
cve-2023-44487
Details Domain 34
www.enisa.europa.eu
Details Domain 7
enisa.europa.eu
Details Domain 55
creativecommons.org
Details Domain 15
www.misp-project.org
Details Domain 4127
github.com
Details Domain 12
europa.eu
Details Domain 11
blog.f-secure.com
Details Domain 35
www.europol.europa.eu
Details Domain 4
www.uscert.gov
Details Domain 2
ncsc.nl
Details Domain 167
www.ic3.gov
Details Domain 101
www.group-ib.com
Details Domain 54
lists.debian.org
Details Domain 219
gist.github.com
Details Domain 182
www.mandiant.com
Details Domain 36
decoded.avast.io
Details Domain 71
blogs.jpcert.or.jp
Details Domain 1
apiiro.com
Details Domain 21
cyware.com
Details Domain 101
cert.pl
Details Domain 28
eur-lex.europa.eu
Details Domain 1
ciras.enisa.europa.eu
Details Domain 469
www.cisa.gov
Details Domain 546
www.recordedfuture.com
Details Domain 7
www.picussecurity.com
Details Domain 10
go.crowdstrike.com
Details Domain 604
www.trendmicro.com
Details Domain 261
blog.talosintelligence.com
Details Domain 224
unit42.paloaltonetworks.com
Details Domain 65
www.cert.ssi.gouv.fr
Details Domain 50
cloud.google.com
Details Domain 13
mockbin.org
Details Domain 7
mocky.io
Details Domain 4
blogs.security.com
Details Domain 262
www.welivesecurity.com
Details Domain 397
www.microsoft.com
Details Domain 98
www.ncsc.gov.uk
Details Domain 22
www.genians.co.kr
Details Domain 55
blog.google
Details Domain 4
www.ncsc.nl
Details Domain 434
medium.com
Details Domain 84
www.zscaler.com
Details Domain 141
research.checkpoint.com
Details Domain 25
www.cyberark.com
Details Domain 37
www.blackberry.com
Details Domain 58
blog.sekoia.io
Details Domain 12
www.dni.gov
Details Domain 2
www.thebureauinvestigates.com
Details Domain 2
www.iccl.ie
Details Domain 27
apnews.com
Details Domain 4
www.sgdsn.gouv.fr
Details Domain 67
citizenlab.ca
Details Domain 37
openai.com
Details Domain 40
edition.cnn.com
Details Domain 66
www.malwarebytes.com
Details Domain 1
blog.unpac.me
Details Domain 172
www.crowdstrike.com
Details Domain 1
ia.acs.org.au
Details Domain 13
blog.lumen.com
Details Domain 144
www.fortinet.com
Details Domain 6
sec.okta.com
Details Domain 8
www.humansecurity.com
Details Domain 19
cybersecurity.att.com
Details Domain 41
arcticwolf.com
Details Domain 1
go.flashpoint.io
Details Domain 7
www.fsisac.com
Details Domain 124
www.sentinelone.com
Details Domain 189
asec.ahnlab.com
Details Domain 370
www.proofpoint.com
Details Domain 16
www.verizon.com
Details Domain 58
redcanary.com
Details Domain 103
www.mcafee.com
Details Domain 403
securelist.com
Details Domain 6
www.nccgroup.com
Details Domain 56
www.dragos.com
Details Domain 1
netenrich.com
Details Domain 1
www.wiley.law
Details Domain 128
www.bitdefender.com
Details Domain 2
www.group
Details Domain 2
ib.com
Details Domain 1
underthebreach.medium.com
Details Domain 59
www.cybereason.com
Details Domain 1
www.acice-asean.org
Details Domain 3
journals.sagepub.com
Details Domain 2
transparency.meta.com
Details Domain 1
securitylab.amnesty.org
Details Domain 1
edri.org
Details Domain 49
home.treasury.gov
Details Domain 17
www.politico.eu
Details Domain 14
time.com
Details Domain 11
services.google.com
Details Domain 280
thehackernews.com
Details Domain 2
www.secalliance.com
Details Domain 53
blogs.blackberry.com
Details Domain 9
www.jpost.com
Details Domain 243
cve.mitre.org
Details Domain 169
www.first.org
Details Domain 641
nvd.nist.gov
Details Domain 35
first.org
Details Domain 55
cwe.mitre.org
Details Domain 571
www.cve.org
Details Domain 154
arxiv.org
Details Domain 14
www.guidepointsecurity.com
Details Domain 13
www.reliaquest.com
Details Domain 99
therecord.media
Details Domain 39
www.helpnetsecurity.com
Details Domain 13
quointelligence.eu
Details Domain 1373
twitter.com
Details Domain 82
csrc.nist.gov
Details Domain 62
nvlpubs.nist.gov
Details Domain 360
attack.mitre.org
Details Domain 78
socradar.io
Details Domain 3
gridinsoft.com
Details Domain 1
cybelangel.com
Details Domain 911
any.run
Details Domain 20
inquest.net
Details Domain 35
www.akamai.com
Details Domain 7
blog.phylum.io
Details Domain 17
www.threatfabric.com
Details Domain 88
securityintelligence.com
Details Domain 27
flare.io
Details Domain 9
darktrace.com
Details Domain 29
www.trellix.com
Details Domain 138
www.securityweek.com
Details Domain 1
recording.next
Details Domain 8
www.consilium.europa.eu
Details Domain 1
bics.com
Details Domain 54
www.scmagazine.com
Details Domain 32
paloaltonetworks.com
Details Domain 41
www.hhs.gov
Details Domain 3
www.domo.com
Details Domain 40
ieeexplore.ieee.org
Details Domain 73
techcrunch.com
Details Domain 13
surfshark.com
Details Domain 1
verfassungsschutz.de
Details Domain 5
blog.barracuda.com
Details Domain 1
fedtechmagazine.com
Details Domain 3
www.cobalt.io
Details Domain 177
www.wired.com
Details Domain 11
digital-strategy.ec.europa.eu
Details Domain 11
carnegieendowment.org
Details Domain 45
www.whitehouse.gov
Details Domain 2
www.immersivelabs.com
Details Domain 6
cybermagazine.com
Details Domain 71
cybernews.com
Details Domain 133
www.infosecurity-magazine.com
Details Domain 1
stormwall.network
Details Domain 52
blog.cloudflare.com
Details Domain 61
www.netscout.com
Details Domain 5
ddos-guard.net
Details Domain 5
www.accessnow.org
Details Domain 21
www.state.gov
Details Domain 41
www.imperva.com
Details Domain 3
www.cloudbric.com
Details Domain 3
www.networkcomputing.com
Details Domain 4
www.cdn.neustar
Details Domain 11
www3.weforum.org
Details Domain 251
www.bleepingcomputer.com
Details Domain 1
www.nexusguard.com
Details Domain 1
vercara.com
Details Domain 3
blog.qrator.net
Details Domain 5
www.disarm.foundation
Details Domain 1
vsquare.org
Details Domain 6
www.nature.com
Details Domain 10
www.atlanticcouncil.org
Details Domain 1
finance.ec.europa.eu
Details Domain 2
lex.europa.eu
Details Domain 5
euvsdisinfo.eu
Details Domain 1
www.ivir.nl
Details Domain 3
cdn.openai.com
Details Domain 4
www.newsguardtech.com
Details Domain 1
dfrlab.org
Details Domain 3
healthcyber.mitre.org
Details Domain 4
sot.mitre.org
Details Domain 3
pr.ir
Details Domain 2
id.im
Details Domain 3
rs.ma
Details Domain 8
rs.co
Details Domain 4
pr.ps
Details Domain 30
www.iso.org
Details Domain 50
www.nist.gov
Details Domain 11
de.ae
Details Domain 10
de.cm
Details Domain 13
id.am
Details Domain 10
pr.at
Details Domain 3
gv.sc
Details Domain 4
artificialintelligenceact.eu
Details Domain 3
www.wsav.com
Details Domain 9
rc.co
Details Domain 5
hacked.com
Details Domain 13
www.f5.com
Details Domain 8
www.aha.org
Details Domain 3
www.eeas.europa.eu
Details Domain 7
stixproject.github.io
Details Domain 4
www.apa.org
Details Domain 15
github.blog
Details Email 3
etl@enisa.europa.eu
Details Email 3
press@enisa.europa.eu
Details File 2
taxonomies.html
Details File 5
2024.pdf
Details File 5
2023_ic3report.pdf
Details File 2
msg00057.html
Details File 1
lazarus_pypi.html
Details File 99
cert.pl
Details File 1
globalthreatreport2024.pdf
Details File 1
earth-freybug.html
Details File 6
router-roulette.html
Details File 141
www.cer
Details File 3
certfr-2023-cti-009.pdf
Details File 1
pawn-storm-uses-brute-force-and-stealth.html
Details File 1
actors-adapt-tactics-for-initial-cloud-access.pdf
Details File 1
ata-2024-unclassified-report.pdf
Details File 1
network_eng_vf.pdf
Details File 816
index.html
Details File 1
expl.html
Details File 1
cyber-criminals-are-getting-faster.html
Details File 1
4e9f02a5-641d-41f4-9d14-e264c0d9d4ea.pdf
Details File 1
accessencryptionexfiltrationmitigation.pdf
Details File 1
2024-unit42-incident-response-report.pdf
Details File 1
fsisac-navcyber24-report.pdf
Details File 2
threat-actors-leverage-file-sharing-service-and-reverse-proxies.html
Details File 1
ransomware-propagates-to-vcenters-and-esxi-via-custom-pow.html
Details File 1
feb_24_info.pdf
Details File 1
matter-a-glance-into-the-spyware-industry.pdf
Details File 3
tool-of-first-resort-israel-hamas-war-cyber.pdf
Details File 2
apt44-unearthing-sandworm.pdf
Details File 1
a-new-age-of-hacktivism.html
Details File 2
cna.html
Details File 2
8374-preliminary-draft.pdf
Details File 2
grit_ransomware_report_q1_2023.pdf
Details File 1
operation-cronos-aftermath.html
Details File 1
threatlabz-ransomware-report.pdf
Details File 1
ransomware-double-dip-re-victimization.html
Details File 2
800-171r2.pdf
Details File 1
imaploader-malware.html
Details File 1
social-engineering_node.html
Details File 9
2022_ic3report.pdf
Details File 1
video-fbi-take-down-uk-hacker-in-spain-for-stealing-27m-usd-of-bitcoins_1000077536-a.html
Details File 1
aa23-320a_scattered_spider_0.pdf
Details File 1
231108.pdf
Details File 1
baza-r-call-campaigns-analyst-note.pdf
Details File 20
media.cer
Details File 2
tlp-white-cert-eu-threat_landscape_report-volume1.pdf
Details File 1
liability-495285.aspx
Details File 104
www.dat
Details File 48
www.spi
Details File 384
www.inf
Details File 1
threat_report_2h2023.pdf
Details File 1
iocta%202023%20-%20en_0.pdf
Details File 1
2023-kio-report.pdf
Details File 1
fsisac_ddos-heretostay.pdf
Details File 3
neustar-cyber-threats-trends-2020-report.pdf
Details File 2
wef_the_global_risks_report_2022.pdf
Details File 1
intelligence-1.pdf
Details File 1
bedbug-panic-was-stoked-by-russia-says-france_6575870_7.html
Details File 1
20240611_np_sgdsn_viginum_matriochka_en_vf.pdf
Details File 1
republic-of-china-seeks-to-reshape-the-global-information-environment_508.pdf
Details File 1
reshape-the-global-information-environment_508.pdf
Details File 1
abc_framework_2019_sept_2019.pdf
Details File 2
forecasting-misuse.pdf
Details File 4
pr.ps
Details File 33
www.iso
Details File 2
20220124_itrc-2021-data-breach-report.pdf
Details File 2
2022-data-breach-investigations-report-dbir.pdf
Details File 2
service-ddos-attacks-march-2021.pdf
Details Github username 11
misp
Details Github username 1
thesamesam
Details Github username 2
mattiwatti
Details Github username 1
fin3ss3g0d
Details Github username 3
blackorbird
Details Github username 3
circl
Details md5 1
223949d5a074ebc3dce9ee78baad9e27
Details md5 1
96de49e381cfa357fcd6d0e7d8ff1e48
Details Mandiant Uncategorized Groups 54
UNC4841
Details Mandiant Uncategorized Groups 52
UNC3886
Details Mandiant Uncategorized Groups 3
UNC4990
Details MITRE ATT&CK Techniques 56
T1587
Details MITRE ATT&CK Techniques 542
T1190
Details MITRE ATT&CK Techniques 191
T1133
Details MITRE ATT&CK Techniques 409
T1566
Details MITRE ATT&CK Techniques 52
T1199
Details MITRE ATT&CK Techniques 239
T1106
Details MITRE ATT&CK Techniques 310
T1047
Details MITRE ATT&CK Techniques 40
T1197
Details MITRE ATT&CK Techniques 16
T1554
Details MITRE ATT&CK Techniques 86
T1136
Details MITRE ATT&CK Techniques 116
T1134
Details MITRE ATT&CK Techniques 208
T1068
Details MITRE ATT&CK Techniques 440
T1055
Details MITRE ATT&CK Techniques 504
T1140
Details MITRE ATT&CK Techniques 48
T1480
Details MITRE ATT&CK Techniques 348
T1036
Details MITRE ATT&CK Techniques 550
T1112
Details MITRE ATT&CK Techniques 627
T1027
Details MITRE ATT&CK Techniques 91
T1620
Details MITRE ATT&CK Techniques 238
T1497
Details MITRE ATT&CK Techniques 172
T1555
Details MITRE ATT&CK Techniques 99
T1539
Details MITRE ATT&CK Techniques 179
T1087
Details MITRE ATT&CK Techniques 29
T1217
Details MITRE ATT&CK Techniques 176
T1135
Details MITRE ATT&CK Techniques 65
T1069
Details MITRE ATT&CK Techniques 433
T1057
Details MITRE ATT&CK Techniques 501
T1012
Details MITRE ATT&CK Techniques 185
T1518
Details MITRE ATT&CK Techniques 50
T1614
Details MITRE ATT&CK Techniques 230
T1033
Details MITRE ATT&CK Techniques 86
T1124
Details MITRE ATT&CK Techniques 109
T1210
Details MITRE ATT&CK Techniques 33
T1080
Details MITRE ATT&CK Techniques 157
T1560
Details MITRE ATT&CK Techniques 19
T1530
Details MITRE ATT&CK Techniques 56
T1213
Details MITRE ATT&CK Techniques 67
T1039
Details MITRE ATT&CK Techniques 219
T1113
Details MITRE ATT&CK Techniques 22
T1429
Details MITRE ATT&CK Techniques 2
T1645
Details MITRE ATT&CK Techniques 14
T1624.001
Details MITRE ATT&CK Techniques 10
T1404
Details MITRE ATT&CK Techniques 2
T1644
Details MITRE ATT&CK Techniques 3
T1636.001
Details MITRE ATT&CK Techniques 27
T1568
Details MITRE ATT&CK Techniques 159
T1095
Details MITRE ATT&CK Techniques 444
T1071
Details MITRE ATT&CK Techniques 50
T1072
Details MITRE ATT&CK Techniques 152
T1090
Details MITRE ATT&CK Techniques 149
T1102
Details MITRE ATT&CK Techniques 422
T1041
Details MITRE ATT&CK Techniques 93
T1485
Details MITRE ATT&CK Techniques 31
T1499
Details MITRE ATT&CK Techniques 197
T1489
Details MITRE ATT&CK Techniques 12
T1636.002
Details MITRE ATT&CK Techniques 17
T1636.003
Details MITRE ATT&CK Techniques 23
T1418
Details MITRE ATT&CK Techniques 6
T1409
Details MITRE ATT&CK Techniques 13
T1422
Details MITRE ATT&CK Techniques 10
T1512
Details MITRE ATT&CK Techniques 36
T1595
Details MITRE ATT&CK Techniques 50
T1592
Details MITRE ATT&CK Techniques 34
T1589
Details MITRE ATT&CK Techniques 33
T1590
Details MITRE ATT&CK Techniques 14
T1591
Details MITRE ATT&CK Techniques 100
T1598
Details MITRE ATT&CK Techniques 4
T1597
Details MITRE ATT&CK Techniques 8
T1596
Details MITRE ATT&CK Techniques 17
T1593
Details MITRE ATT&CK Techniques 14
T1594
Details MITRE ATT&CK Techniques 66
T1583
Details MITRE ATT&CK Techniques 36
T1586
Details MITRE ATT&CK Techniques 66
T1584
Details MITRE ATT&CK Techniques 13
T1585
Details MITRE ATT&CK Techniques 145
T1588
Details MITRE ATT&CK Techniques 46
T1608
Details MITRE ATT&CK Techniques 306
T1078
Details MITRE ATT&CK Techniques 420
T1204
Details MITRE ATT&CK Techniques 5
T1599
Details MITRE ATT&CK Techniques 534
T1005
Details MITRE ATT&CK Techniques 34
T1025
Details MITRE ATT&CK Techniques 67
T1074
Details MITRE ATT&CK Techniques 102
T1020
Details MITRE ATT&CK Techniques 92
T1048
Details MITRE ATT&CK Techniques 7
T1011
Details MITRE ATT&CK Techniques 6
T1052
Details MITRE ATT&CK Techniques 126
T1567
Details MITRE ATT&CK Techniques 22
T1029
Details MITRE ATT&CK Techniques 33
T1537
Details MITRE ATT&CK Techniques 56
T1553
Details MITRE ATT&CK Techniques 58
T1498
Details MITRE ATT&CK Techniques 183
T1189
Details MITRE ATT&CK Techniques 168
T1046
Details MITRE ATT&CK Techniques 21
T1557
Details MITRE ATT&CK Techniques 245
T1203
Details MITRE ATT&CK Techniques 33
T1565
Details MITRE ATT&CK Techniques 65
T1491
Details MITRE ATT&CK Techniques 52
T1195
Details MITRE ATT&CK Techniques 8
T1200
Details Microsoft Threat Actor Naming Taxonomy (Groups in development) 26
Storm-1359
Details Threat Actor Identifier - APT 665
APT29
Details Threat Actor Identifier - APT 783
APT28
Details Threat Actor Identifier - APT 20
APT44
Details Threat Actor Identifier by Red Alert 1
Sector540
Details Url 4
https://creativecommons.org/licenses/by/4.0
Details Url 1
https://www.enisa.europa.eu/publications/enisa-threat-landscape-methodology.
Details Url 2
https://www.enisa.europa.eu/publications/enisa-threat-landscape-
Details Url 2
https://www.misp-project.org/taxonomies.html#_estimative_language
Details Url 2
https://github.com/misp/misp-galaxy.
Details Url 2
https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks.
Details Url 1
https://blog.f-secure.com/data-breach-and-data-leak-whats-the-difference.
Details Url 2
https://www.upguard.com/blog/data-breach-vs-data-leak#:
Details Url 2
https://www.europol.europa.eu/activities-services/main-reports/internet-
Details Url 2
https://www.uscert.gov/ncas/tips/st04-015.
Details Url 5
https://www.ic3.gov/media/pdf/annualreport/2023_ic3report.pdf
Details Url 1
https://www.group-ib.com/resources/research-hub/hi-tech-crime-trends-2023-eu
Details Url 2
https://lists.debian.org/debian-security-announce/2024/msg00057.html
Details Url 1
https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
Details Url 1
https://openssf.org/blog/2024/04/15/open-source-security-openssf-and-openjs-foundations-issue-alert-for-social-
Details Url 4
https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023
Details Url 1
https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005
Details Url 1
https://decoded.avast.io/janrubin/guptiminer-hijacking-antivirus-
Details Url 1
https://blogs.jpcert.or.jp/en/2024/02/lazarus_pypi.html
Details Url 1
https://apiiro.com/blog/malicious-code-campaign-github-repo-
Details Url 1
https://cyware.com/news/north-
Details Url 1
https://cert.pl/en/posts/2023/12/apt29-teamcity
Details Url 1
https://www.microsoft.com/en-us/security/blog/2023/10/18/multiple-north-korean-threat-actors-exploiting-the-teamcity-cve-
Details Url 3
https://eur-lex.europa.eu/legal-content/en/txt/pdf/?uri=celex:32022l2555
Details Url 1
https://ciras.enisa.europa.eu
Details Url 1
https://www.cisa.gov/topics/physical-security/insider-threat-mitigation
Details Url 2
https://www.mandiant.com/m-trends.
Details Url 1
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a.
Details Url 1
https://www.mandiant.com/resources/blog/gru-disruptive-playbook.
Details Url 1
https://www.recordedfuture.com/2023-adversary-infrastructure-report.
Details Url 1
https://www.picussecurity.com/resource/report/picus-red-report-2024.
Details Url 1
https://go.crowdstrike.com/rs/281-obq-266/images/globalthreatreport2024.pdf
Details Url 1
https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/.
Details Url 1
https://www.trendmicro.com/en_us/research/24/d/earth-freybug.html
Details Url 1
https://blog.talosintelligence.com/arcanedoor-new-espionage-
Details Url 1
https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/.
Details Url 5
https://www.trendmicro.com/en_us/research/24/e/router-roulette.html
Details Url 3
https://www.cert.ssi.gouv.fr/uploads/certfr-2023-cti-009.pdf
Details Url 1
https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-orb-networks/.
Details Url 1
https://unit42.paloaltonetworks.com/stately-taurus-targets-philippines-government-cyberespionage/.
Details Url 1
https://www.mandiant.com/resources/blog/apt29-evolving-diplomatic-phishing.
Details Url 1
https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/.
Details Url 1
https://www.recordedfuture.com/flying-under-the-radar-abusing-github-malicious-infrastructure.
Details Url 1
https://cert.pl/en/posts/2024/05/apt28-campaign/.
Details Url 1
https://www.welivesecurity.com/en/eset-
Details Url 1
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-046a.
Details Url 1
https://www.microsoft.com/en-us/security/blog/2023/09/14/peach-
Details Url 1
https://www.trendmicro.com/en_in/research/24/a/pawn-storm-uses-brute-force-and-stealth.html
Details Url 2
https://www.cisa.gov/news-events/cybersecurity-
Details Url 1
https://www.ncsc.gov.uk/files/advisory-svr-cyber-
Details Url 4
https://www.microsoft.com/en-
Details Url 1
https://www.genians.co.kr/blog/threat_intelligence/facebook.
Details Url 1
https://blog.google/technology/safety-security/a-review-of-
Details Url 1
https://unit42.paloaltonetworks.com/russian-apt-
Details Url 2
https://blog.google/threat-analysis-
Details Url 1
https://www.ncsc.nl/documenten/publicaties/2024/februari/6/mivd-
Details Url 1
https://www.enisa.europa.eu/news/joint-statement-on-ivanti.
Details Url 1
https://www.cisa.gov/news-events/directives/supplemental-direction-v1-ed-
Details Url 1
https://www.mandiant.com/resources/blog/unc4841-post-barracuda-zero-day-remediation.
Details Url 4
https://www.cisa.gov/news-
Details Url 1
https://www.mandiant.com/resources/blog/chinese-vmware-exploitation-since-2021.
Details Url 1
https://medium.com/mitre-
Details Url 1
https://blog.talosintelligence.com/lazarus-quiterat/.
Details Url 1
https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-
Details Url 2
https://www.zscaler.com/blogs/security-
Details Url 1
https://www.kroll.com/en/insights/publications/cyber/screenconnect-vulnerability-exploited-to-deploy-babyshark.
Details Url 1
https://research.checkpoint.com/2023/elections-
Details Url 1
https://www.cyberark.com/resources/blog/election-security-defending-democracy-in-
Details Url 1
https://www.blackberry.com/us/en/solutions/threat-intelligence/threat-report.
Details Url 1
https://blog.sekoia.io/master-of-puppets-uncovering-the-doppelganger-pro-russian-influence-campaign/.
Details Url 1
https://www.dni.gov/files/odni/documents/assessments/ata-2024-unclassified-report.pdf
Details Url 1
https://www.thebureauinvestigates.com/stories/2023-07-27/what-are-influence-
Details Url 1
https://www.iccl.ie/2023/new-iccl-reports-reveal-serious-security-threat-to-the-eu-
Details Url 1
https://apnews.com/article/france-
Details Url 1
https://www.sgdsn.gouv.fr/files/files/20240212_np_sgdsn_viginum_portal-kombat-
Details Url 1
https://citizenlab.ca/2024/02/paperwall-chinese-
Details Url 1
https://www.gartner.com/en/newsroom/press-releases/2024-02-13-gartner-forecasts-security-and-risk-management-
Details Url 1
https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat
Details Url 1
https://openai.com/blog/disrupting-malicious-
Details Url 1
https://edition.cnn.com/2024/02/01/politics/election-deepfake-threats-invs/index.html
Details Url 1
https://blogs.microsoft.com/on-the-issues/2024/04/04/china-ai-influence-elections-mtac-cybersecurity/.
Details Url 1
https://www.trendmicro.com/en_us/research/24/a/kasseika-ransomware-deploys-byovd-attacks-abuses-psexec-and-
Details Url 1
https://unit42.paloaltonetworks.com/medusa-ransomware-
Details Url 1
https://www.malwarebytes.com/blog/business/2024/02/why-
Details Url 1
https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-
Details Url 1
https://blog.unpac.me/2024/01/30/malware-trends-yearly/.
Details Url 1
https://unit42.paloaltonetworks.com/glupteba-malware-uefi-bootkit
Details Url 1
https://github.com/mattiwatti/efiguard.
Details Url 1
https://www.crowdstrike.com/resources/reports/threat-hunting-report/.
Details Url 1
https://ia.acs.org.au/article/2023/cyber-criminals-are-getting-faster.html
Details Url 1
https://www.welivesecurity.com/en/cybersecurity/year-review-10-biggest-security-incidents-2023/.
Details Url 1
https://cloud.google.com/blog/topics/threat-
Details Url 1
https://blog.lumen.com/the-darkside-of-themoon/.
Details Url 1
https://www.fortinet.com/blog/threat-research/new-goldoon-botnet-targeting-d-link-devices.
Details Url 1
https://sec.okta.com/blockanonymizers.
Details Url 1
https://www.humansecurity.com/learn/blog/satori-threat-intelligence-alert-proxylib-
Details Url 1
https://cybersecurity.att.com/blogs/labs-research/mac-
Details Url 1
https://arcticwolf.com/resource/_pfcdn/assets/preprocessed/10926/4e9f02a5-
Details Url 1
https://go.flashpoint.io/2024-global-threat-intelligence-report-download.
Details Url 1
https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities.
Details Url 1
https://www.fsisac.com/hubfs/knowledge/lockbit-
Details Url 1
https://www.sentinelone.com/blog/moveit-transfer-exploited-to-drop-file-stealing-sql-shell/.
Details Url 1
https://asec.ahnlab.com/en/64034/.
Details Url 1
https://www.ncsc.gov.uk/blog-post/smart-devices-law.
Details Url 1
https://www.paloaltonetworks.com/content/dam/pan/en_us/assets/pdf/reports/2024-unit42-incident-response-report.pdf
Details Url 1
https://www.proofpoint.com/us/blog/identity-threat-defense/rise-in-identity-threats.
Details Url 1
https://www.verizon.com/business/resources/reports/dbir/.
Details Url 1
https://redcanary.com/blog/2024-threat-detection-report/.
Details Url 1
https://www.proofpoint.com/uk/blog/cloud-
Details Url 1
https://blog.talosintelligence.com/coralraider-
Details Url 1
https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud-
Details Url 1
https://www.group-ib.com/resources/research-hub/hi-tech-crime-trends-2023-eu/.
Details Url 1
https://decoded.avast.io/threatresearch/avast-q1-2024-threat-report/.
Details Url 1
https://research.checkpoint.com/2023/the-
Details Url 1
https://www.fsisac.com/hubfs/knowledge/navigatingcyber/2024/fsisac-navcyber24-report.pdf
Details Url 1
https://github.com/fin3ss3g0d/evilgophish?tab=readme
Details Url 2
https://www.trendmicro.com/en_us/research/23/k/threat-actors-leverage-file-sharing-service-and-reverse-proxies.html
Details Url 1
https://blog.talosintelligence.com/threat-actors-leveraging-document-publishing-sites/.
Details Url 2
https://unit42.paloaltonetworks.com/url-delivered-ransomware/.
Details Url 1
https://www.mandiant.com/resources/blog/unc4990-evolution-usb-malware.
Details Url 1
https://www.sentinelone.com/blog/exploiting-repos-6-ways-threat-actors-abuse-github-other-devops-platforms/.
Details Url 1
https://www.darkreading.com/threat-intelligence/hackers-create-legit-phishing-links-with-ghost-github-gitlab-comments.
Details Url 1
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/redline-stealer-a-
Details Url 1
https://blog.talosintelligence.com/google-cloud-run-abuse/.
Details Url 1
https://www.netskope.com/blog/phishing-with-cloudflare-workers-transparent-phishing-and-html-smuggling.
Details Url 1
https://www.trendmicro.com/en_us/research/24/c/agenda-
Details Url 1
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a.
Details Url 1
https://www.sentinelone.com/blog/from-conti-to-akira-decoding-the-latest-linux-esxi-ransomware-families/.
Details Url 1
https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-
Details Url 1
https://unit42.paloaltonetworks.com/blackcat-ransomware-
Details Url 1
https://securelist.com/network-tunneling-with-qemu/111803/.
Details Url 1
https://www.nccgroup.com/us/threat-monitor-report-2023/.
Details Url 1
https://www.dragos.com/blog/dragos-industrial-
Details Url 1
https://netenrich.com/blog/red-cryptoapp-
Details Url 1
https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/.
Details Url 1
https://www.sentinelone.com/blog/ransomware-evolution-how-cheated-affiliates-are-recycling-victim-data-for-profit/.
Details Url 1
https://www.wiley.law/alert-
Details Url 1
https://www.bitdefender.com/blog/hotforsecurity/french-
Details Url 2
https://www.europol.europa.eu/media-
Details Url 1
https://www.europol.europa.eu/media-press/newsroom/news/largest-
Details Url 1
https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2023/.
Details Url 1
https://www.bitdefender.com/blog/labs/ai-meets-next-gen-info-stealers-in-social-media-malvertising-campaigns/.
Details Url 1
https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta547-targets-german-organizations-rhadamanthys-stealer.
Details Url 1
https://edition.cnn.com/2024/05/16/tech/arup-deepfake-scam-loss-hong-kong-intl-hnk/index.html
Details Url 1
https://www.group
Details Url 1
https://www.mandiant.com/resources/blog/initial-access-brokers-exploit-f5-screenconnect.
Details Url 1
https://underthebreach.medium.com/initial-access-
Details Url 1
https://www.cybereason.com/blog/unboxing-snake-python-infostealer-lurking-through-messaging-service.
Details Url 1
https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/.
Details Url 1
https://www.sentinelone.com/blog/12-months-of-fighting-cybercrime-
Details Url 1
https://www.sentinelone.com/blog/macos-
Details Url 1
https://blog.talosintelligence.com/need-to-know-
Details Url 1
https://www.proofpoint.com/us/blog/email-and-cloud-threats/tycoon-2fa-phishing-kit-mfa-bypass.
Details Url 1
https://blog.lastpass.com/posts/2024/04/advanced-phishing-kit-adds-lastpass-branding-for-use-in-phishing-campaigns.
Details Url 1
https://www.sentinelone.com/blog/the-rise-of-drainer-as-a-service-understanding-daas/.
Details Url 1
https://www.acice-asean.org/files/information%20centre%20reports/feb_24_info.pdf
Details Url 1
https://journals.sagepub.com/doi/10.1177/20563051231224723.
Details Url 1
https://www.sentinelone.com/blog/kryptina-raas-
Details Url 1
https://transparency.meta.com/en-gb/metasecurity/threat-reporting.
Details Url 1
https://github.com/blackorbird/apt_report/blob/master/summary/2024/atlantic-council-american-university-markets-
Details Url 1
https://www.euractiv.com/section/digital/opinion/governments-spying-on-citizens-who-is-to-blame-what-can-the-eu-do/.
Details Url 1
https://securitylab.amnesty.org/latest/2024/05/a-web-of-surveillance/.
Details Url 1
https://edri.org/our-work/press-release-brussels-
Details Url 1
https://home.treasury.gov/news/press-releases/jy2155.
Details Url 1
https://www.state.gov/announcement-of-a-visa-restriction-policy-to-promote-accountability-for-the-misuse-of-
Details Url 1
https://www.darkreading.com/cyber-risk/cyber-operations-intensify-in-middle-east-with-israel-the-main-target.
Details Url 1
https://www.politico.eu/article/israel-hamas-war-hackers-cyberattacks/.
Details Url 1
https://time.com/6322175/israel-hamas-cyberattacks-hackers/.
Details Url 3
https://services.google.com/fh/files/misc/tool-of-first-resort-israel-hamas-war-cyber.pdf
Details Url 1
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a.
Details Url 1
https://www.sentinelone.com/labs/the-israel-hamas-war-cyber-domain-state-sponsored-activity-of-interest/.
Details Url 2
https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf
Details Url 1
https://thehackernews.com/2024/02/a-new-age-of-hacktivism.html
Details Url 1
https://www.sentinelone.com/blog/oct-2023-cybercrime-update-
Details Url 1
https://www.secalliance.com/blog/russia-
Details Url 1
https://blogs.blackberry.com/en/2023/11/bibi-wiper-used-in-the-israel-hamas-war-now-runs-on-windows.
Details Url 1
https://www.jpost.com/israel-
Details Url 1
https://www.sentinelone.com/blog/ikaruz-red-team-hacktivist-group-leverages-ransomware-for-attention-not-profit/.
Details Url 2
https://www.first.org/events/colloquia/cardiff2023/program#ptime
Details Url 8
https://cve.mitre.org
Details Url 2
https://www.first.org/cvss/.
Details Url 2
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator.
Details Url 2
https://cve.mitre.org/cve/cna.html
Details Url 1
https://cwe.mitre.org/.
Details Url 1
https://www.cve.org/programorganization/cnas.
Details Url 1
https://www.cisa.gov/known-exploited-vulnerabilities.
Details Url 2
https://cwe.mitre.org/top25/index.html
Details Url 1
https://www.cisa.gov/resources-tools/resources/secure-by-design-and-default.
Details Url 2
https://csrc.nist.gov/csrc/media/publications/nistir/draft/documents/nist.ir.8374-preliminary-draft.pdf
Details Url 2
https://www.guidepointsecurity.com/wp-content/uploads/2023/04/grit_ransomware_report_q1_2023.pdf
Details Url 1
https://www.reliaquest.com/blog/ransomware-q2-2023-victim-count-hits-new-heights/.
Details Url 1
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023.
Details Url 1
https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-disrupt-worlds-biggest-ransomware-
Details Url 1
https://therecord.media/lockbitsupp-suspect-accused-lockbit-ransomware-gang.
Details Url 1
https://www.trendmicro.com/en_us/research/24/d/operation-cronos-aftermath.html
Details Url 1
https://www.sophos.com/en-us/press/press-releases/2024/04/ransomware-payments-increase-500-last-year-finds-
Details Url 1
https://www.bleepingcomputer.com/news/security/ransomware-payments-drop-to-record-low-of-28-percent-in-q1-2024/.
Details Url 1
https://www.helpnetsecurity.com/2024/04/19/ransomware-q1-2024-payments/.
Details Url 1
https://www.bleepingcomputer.com/news/security/dark-angels-ransomware-receives-record-breaking-75-million-ransom/.
Details Url 1
https://www.zscaler.com/resources/industry-reports/threatlabz-ransomware-report.pdf
Details Url 1
https://thehackernews.com/2024/04/ransomware-double-dip-re-victimization.html
Details Url 1
https://www.bankinfosecurity.com/blogs/ransomware-groups-data-leak-blogs-lie-stop-trusting-them-p-3583.
Details Url 1
https://quointelligence.eu/2024/06/analyzing-shift-in-ransomware-dynamics/.
Details Url 1
https://twitter.com/uca_ruhate_/status/1714503030849032476.
Details Url 1
https://www.europol.europa.eu/media-press/newsroom/news/ragnar-locker-ransomware-gang-taken-down-international-
Details Url 1
https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant.
Details Url 1
https://www.bleepingcomputer.com/news/security/ransomware-gang-files-sec-complaint-over-victims-undisclosed-
Details Url 1
https://www.reliaquest.com/blog/q2-2024-ransomware/.
Details Url 2
https://csrc.nist.gov/glossary/term/malware.
Details Url 2
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-171r2.pdf
Details Url 2
https://attack.mitre.org/techniques/t1587/001/.
Details Url 1
https://socradar.io/top-10-stealer-logs/.
Details Url 1
https://gridinsoft.com/blogs/infostealer-malware-top/.
Details Url 1
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/redline-stealer-a-novel-approach
Details Url 1
https://cybelangel.com/how-have-infostealers-evolved-in-2024/.
Details Url 2
https://attack.mitre.org/software/s0331/.
Details Url 1
https://any.run/malware-trends/formbook
Details Url 1
https://any.run/malware-trends/lumma
Details Url 1
https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers-
Details Url 1
https://www.welivesecurity.com/en/eset-research/evasive-panda-leverages-monlam-festival-target-tibetans
Details Url 1
https://inquest.net/blog/top-malware-delivery-tactics-watch-out-2023/.
Details Url 1
https://www.akamai.com/blog/security-research/2024-redtail-cryptominer-pan-os-cve-exploit.
Details Url 1
https://www.fortinet.com/blog/threat-research/scrubcrypt-deploys-venomrat-with-arsenal-of-plugins.
Details Url 2
https://blog.phylum.io/persistent-npm-campaign-shipping-trojanized-jquery
Details Url 1
https://www.helpnetsecurity.com/2024/01/03/banking-trojans-mobile-devices/.
Details Url 1
https://www.welivesecurity.com/en/eset-research/eset-threat-report-h1-2024/.
Details Url 1
https://www.threatfabric.com/blogs/brokewell-do-not-go-broke-by-new-banking-malware.
Details Url 1
https://securityintelligence.com/x-force/grandoreiro-banking-trojan-unleashed/.
Details Url 1
https://flare.io/learn/resources/blog/malware-as-a-service/.
Details Url 1
https://darktrace.com/blog/the-rise-of-the-lumma-info-stealer.
Details Url 1
https://www.trellix.com/blogs/research/the-continued-evolution-of-the-darkgate-malware-as-a-service/.
Details Url 1
https://www.securityweek.com/trickbot-and-other-malware-droppers-disrupted-by-law-enforcement/.
Details Url 1
https://www.europol.europa.eu/media-press/newsroom/news/largest-ever-operation-against-botnets-hits-dropper-
Details Url 1
https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical.
Details Url 1
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-242a.
Details Url 2
https://twitter.com/msftsecintel/status/1735856754427047985
Details Url 1
https://www.enisa.europa.eu/topics/incident-response/glossary/what-is-social-engineering.
Details Url 1
https://www.bsi.bund.de/en/themen/verbraucherinnen-und-verbraucher/cyber-sicherheitslage/methoden-der-cyber-
Details Url 1
https://www.consilium.europa.eu/en/policies/cybersecurity/cybersecurity-social-engineering/.
Details Url 1
https://bics.com/press-releases/bics-blocks-87-million-euros-worth-of-fraud-attacks/.
Details Url 5
https://www.ic3.gov/media/pdf/annualreport/2022_ic3report.pdf
Details Url 1
https://www.cisa.gov/news-events/alerts/2024/06/12/phone-scammers-impersonating-cisa-employees.
Details Url 1
https://www.ftc.gov/news-events/news/press-releases/2024/03/federal-trade-commission-warns-scammers-pretending-
Details Url 1
https://www.europol.europa.eu/report-a-crime/report-cybercrime-online.
Details Url 1
https://murciatoday.com/video-fbi-take-down-uk-hacker-in-spain-for-stealing-27m-usd-of-bitcoins_1000077536-a.html
Details Url 1
https://www.cisa.gov/sites/default/files/2023-11/aa23-320a_scattered_spider_0.pdf
Details Url 1
https://www.scmagazine.com/news/north-koreas-moonstone-sleet-targets-victims-with-malicious-tools.
Details Url 1
https://www.darkreading.com/threat-intelligence/dprk-hackers-masquerade-as-tech-recruiters-job-seekers.
Details Url 1
https://www.bleepingcomputer.com/news/security/fake-job-interviews-target-developers-with-new-python-backdoor/.
Details Url 1
https://www.darkreading.com/cyberattacks-data-breaches/warmcookie-cyberattackers-backdoor-initial-access.
Details Url 1
https://twitter.com/parth220_/status/1771589789143478471.
Details Url 1
https://blog.talosintelligence.com/how-are-attackers-trying-to-bypass-mfa/.
Details Url 2
https://unit42.paloaltonetworks.com/luna-moth-callback-phishing/.
Details Url 1
https://www.ic3.gov/media/news/2023/231108.pdf
Details Url 1
https://www.hhs.gov/sites/default/files/baza-r-call-campaigns-analyst-note.pdf
Details Url 1
https://www.domo.com/learn/infographic/data-never-sleeps-11.
Details Url 2
https://blog.f-secure.com/data-breach-and-data-leak-whats-the-difference/.
Details Url 1
https://ieeexplore.ieee.org/document/10175648.
Details Url 1
https://techcrunch.com/2023/08/25/moveit-mass-hack-by-the-numbers/.
Details Url 2
https://surfshark.com/research/data-breach-monitoring.
Details Url 2
https://media.cert.europa.eu/static/memo/2021/tlp-white-cert-eu-threat_landscape_report-volume1.pdf#page=13&zoom=auto
Details Url 1
https://www.tenable.com/blog/cybersecurity-snapshot-a-look-back-at-key-2023-cyber-data-for-genai-cloud-security.
Details Url 1
https://cloudsecurityalliance.org/press-releases/2023/06/05/new-cloud-security-alliance-survey-finds-saas-security-has-
Details Url 1
https://blog.barracuda.com/2024/04/03/generative-ai-data-poisoning-manipulation.
Details Url 1
https://fedtechmagazine.com/article/2024/01/unpacking-ai-data-poisoning.
Details Url 1
https://www.cobalt.io/blog/data-poisoning-attacks-a-new-attack-vector-within-ai.
Details Url 1
https://www.forbes.com/sites/bernardmarr/2024/02/05/five-generative-ai-chatbots-everyone-should-know-about/.
Details Url 1
https://www.wired.com/story/generative-ai-prompt-injection-hacking/.
Details Url 1
https://siliconangle.com/2024/05/21/immersive-labs-warns-generative-ai-bots-highly-vulnerable-prompt-injection-
Details Url 2
https://www.consilium.europa.eu/en/press/press-releases/2023/05/20/g7-hiroshima-leaders-communique/.
Details Url 2
https://digital-strategy.ec.europa.eu/en/policies/european-approach-artificial-intelligence.
Details Url 1
https://carnegieendowment.org/research/2024/02/tracing-the-roots-of-chinas-ai-regulations?lang=en
Details Url 2
https://www.whitehouse.gov/ostp/ai-bill-of-rights/.
Details Url 1
https://www.immersivelabs.com/dark-side-of-genai-report/.
Details Url 1
https://www.insurancebusinessmag.com/uk/news/technology/how-generative-ai-is-reshaping-conversations-around-
Details Url 1
https://cybermagazine.com/articles/sensitive-data-like-passwords-and-pii-shared-to-ai-chatbots.
Details Url 1
https://www.datacenterdynamics.com/en/news/amazons-q-generative-ai-chatbot-leaks-location-of-aws-data-centers/.
Details Url 1
https://www.spiceworks.com/tech/artificial-intelligence/news/chatgpt-leaks-sensitive-user-data-openai-suspects-hack/.
Details Url 1
https://cybernews.com/security/chatgpt-samsung-leak-explained-lessons/#google_vignette
Details Url 1
https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat.
Details Url 1
https://www.forbes.com/sites/forbestechcouncil/2023/10/16/generative-ai-is-the-next-tactical-cyber-weapon-for-threat-
Details Url 1
https://www.infosecurity-magazine.com/news/french-employment-agency-data/.
Details Url 2
https://www.akamai.com/resources/research-paper/the-evolution-of-ddos-return-of-the-hacktivists.
Details Url 1
https://stormwall.network/ddos-report-stormwall-q4-2023.
Details Url 1
https://www.akamai.com/blog/security/a-retrospective-on-ddos-trends-in-2023.
Details Url 1
https://blog.cloudflare.com/ddos-threat-report-2023-q4.
Details Url 1
https://blog.cloudflare.com/cyber-attacks-in-the-israel-hamas-war/.
Details Url 1
https://www.netscout.com/threatreport/.
Details Url 1
https://www.imperva.com/resources/resource-library/reports/2024-imperva-ddos-threat-landscape-report
Details Url 1
https://stormwall.network/ddos-attack-report-2023.
Details Url 1
https://www.netscout.com/threatreport/wp-content/uploads/2024/04/threat_report_2h2023.pdf
Details Url 1
https://www.netscout.com/threatreport/ddos-
Details Url 1
https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps.
Details Url 1
https://blog.cloudflare.com/ddos-threat-report-2023-q3.
Details Url 1
https://blog.cloudflare.com/ddos-threat-report-for-2024-q1.
Details Url 1
https://ddos-guard.net/info/protect?id=51722
Details Url 1
https://www.bleepingcomputer.com/news/security/fbi-seized-domains-linked-to-48-ddos-for-hire-service-
Details Url 2
https://www.microsoft.com/en-us/security/blog/2023/02/21/2022-in-review-ddos-attack-trends-and-insights/.
Details Url 1
https://www.europol.europa.eu/cms/sites/default/files/documents/iocta%202023%20-%20en_0.pdf
Details Url 1
https://www.port.ac.uk/news-events-and-blogs/blogs/us-sanctions-on-iranian-hackers-highlight-growing-concern-about-
Details Url 1
https://www.akamai.com/lp/soti/high-stakes-of-innovation.
Details Url 1
https://blog.cloudflare.com/q1-2024-internet-disruption-summary.
Details Url 1
https://www.accessnow.org/wp-content/uploads/2024/05/2023-kio-report.pdf
Details Url 2
https://www.accessnow.org/campaign/keepiton/.
Details Url 1
https://slovenia.mfa.gov.ua/en/news/russian-group-cyber-army-russia-reborn-announced-cyber-attacks-critical-
Details Url 1
https://www.state.gov/sanctioning-members-of-the-cyber-army-of-russia-reborn
Details Url 2
https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm
Details Url 2
https://www.imperva.com/blog/lift-the-ddos-smokescreen-investigate-underlying-attacks/.
Details Url 1
https://www.fsisac.com/hubfs/knowledge/ddos/fsisac_ddos-heretostay.pdf
Details Url 2
https://www.cloudbric.com/blog/2020/11/ddos-rdos-extortion-
Details Url 2
https://www.networkcomputing.com/network-security/ransom-ddos-phenomenon-pay-or-get-knocked-offline.
Details Url 3
https://www.cdn.neustar/resources/whitepapers/security/neustar-cyber-threats-trends-2020-report.pdf
Details Url 2
https://www3.weforum.org/docs/wef_the_global_risks_report_2022.pdf
Details Url 1
https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-
Details Url 1
https://www.helpnetsecurity.com/2023/06/19/microsoft-365-azure-ddos/.
Details Url 1
https://www.nexusguard.com/file/nexusguard-ddos-trend-report-2024.
Details Url 1
https://vercara.com/resources/2023-ddos-statistics-and-trends.
Details Url 1
https://blog.qrator.net/en/2023-ddos-attacks-statistics-and-
Details Url 2
https://www.infosecurity-magazine.com/blogs/2022-ddos-yearinreview/.
Details Url 1
https://azure.microsoft.com/es-es/blog/unwrapping-the-2023-holiday-season-a-deep-dive-into-azures-ddos-attack-landscape/.
Details Url 1
https://www.bleepingcomputer.com/news/security/ddos-attacks-target-eu-political-parties-as-elections-begin/.
Details Url 1
https://blog.cloudflare.com/exploring-the-2024-eu-election-internet-traffic-trends-and-cybersecurity-insights.
Details Url 1
https://www.akamai.com/newsroom/press-release/akamai-report-finds-ddos-attacks-against-financial-services-gambling-
Details Url 1
https://www.nexusguard.com/press/87-of-ddos-attacks-targeted-windows-os-devices-in-2023.
Details Url 1
https://www.akamai.com/blog/security/akamai-prevents-the-largest-ddos-attack-on-a-us-financial-company.
Details Url 2
https://www.eeas.europa.eu/eeas/tackling-disinformation-foreign-information-manipulation-interference_en.
Details Url 2
https://www.disarm.foundation/framework.
Details Url 1
https://medium.com/disarming-disinformation/disarm-v1-5-personas-update-bf0323614e3b
Details Url 1
https://www.enisa.europa.eu/publications/foreign-information-manipulation-interference-fimi-and-cybersecurity-threat-
Details Url 12
https://attack.mitre.org/.
Details Url 1
https://raport.valisluureamet.ee/2023/en/russian-armed-forces/1-3-russia-continues-to-look-for-a-weak-link-in-ukrainian-
Details Url 2
https://www.microsoft.com/en-us/security/security-
Details Url 1
https://www.theguardian.com/world/2024/feb/23/2024-global-elections-tracker-voting-dates-us-india-indonesia-belarus-
Details Url 1
https://www.eeas.europa.eu/eeas/2nd-eeas-report-foreign-information-manipulation-and-interference-threats_en.
Details Url 1
https://digital-strategy.ec.europa.eu/en/news/new-cybersecurity-compendium-how-protect-integrity-elections-published.
Details Url 1
https://www.europarl.europa.eu/news/en/press-room/20230524ipr91908/foreign-interference-meps-call-for-urgent-
Details Url 1
https://edmo.eu/blog/eu-elections-2024-the-battle-against-disinformation-was-won-but-the-attrition-war-is-far-from-over/.
Details Url 1
https://www.radware.com/blog/security/2024/06/uncovering-the-hacktivist-cyberattacks-targeting-the-eu-election/.
Details Url 1
https://vsquare.org/behind-the-hack-and-leak-scandal-in-poland/.
Details Url 1
https://www.lemonde.fr/en/france/article/2024/03/01/bedbug-panic-was-stoked-by-russia-says-france_6575870_7.html
Details Url 1
https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/how-russia-is-trying-to-disrupt-the-2024-
Details Url 1
https://www.sgdsn.gouv.fr/files/files/20240611_np_sgdsn_viginum_matriochka_en_vf.pdf
Details Url 1
https://www.nature.com/articles/s41598-024-60653-y
Details Url 1
https://www.atlanticcouncil.org/in-depth-research-reports/report/undermining-
Details Url 1
https://www.state.gov/wp-content/uploads/2023/10/how-the-peoples-
Details Url 1
https://www.state.gov/wp-content/uploads/2023/10/how-the-peoples-republic-of-china-seeks-to-
Details Url 1
https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-
Details Url 1
https://www.theguardian.com/technology/article/2024/may/18/how-china-is-using-ai-news-anchors-to-deliver-its-
Details Url 2
https://openai.com/index/disrupting-deceptive-uses-of-ai-by-covert-influence-operations
Details Url 1
https://finance.ec.europa.eu/eu-and-
Details Url 3
https://blog.sekoia.io/master-of-puppets-uncovering-the-doppelganger-pro-russian-influence-campaign
Details Url 1
https://euvsdisinfo.eu/something-dark-hiding-behind-the-ads/.
Details Url 1
https://www.ivir.nl/publicaties/download/abc_framework_2019_sept_2019.pdf
Details Url 2
https://cdn.openai.com/papers/forecasting-misuse.pdf
Details Url 1
https://www.wired.com/story/openai-threat-report-china-russia-ai-propaganda/.
Details Url 1
https://www.newsguardtech.com/special-reports/ai-tracking-center/.
Details Url 1
https://openai.com/index/disrupting-deceptive-uses-of-ai-by-covert-
Details Url 1
https://dfrlab.org/2024/07/09/ai-tools-usage-for-disinformation-in-the-war-in-ukraine
Details Url 2
https://healthcyber.mitre.org/blog/resources/attack-navigator
Details Url 2
https://attack.mitre.org/techniques/t1587/001
Details Url 57
https://attack.mitre.org
Details Url 2
https://sot.mitre.org
Details Url 3
https://www.iso.org/standard/27001
Details Url 14
https://www.nist.gov/cyberframework
Details Url 2
https://github.com/circl/ail-framework
Details Url 2
https://artificialintelligenceact.eu
Details Url 2
https://www.wsav.com/wp-content/uploads/sites/75/2022/01/20220124_itrc-2021-data-breach-report.pdf
Details Url 2
https://blog.f-secure.com/data-breach-and-data-leak-whats-the-difference
Details Url 2
https://www.verizon.com/business/resources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf
Details Url 2
https://www.netscout.com/blog/asert/ddos-attack-campaign-targeting-multiple-organizations-ukraine
Details Url 2
https://www.f5.com/labs/articles/threat-intelligence/2022-application-protection-report-ddos-attack-trends
Details Url 2
https://hacked.com/will-2022-be-the-year-of-the-ddos-attack
Details Url 2
https://www.f5.com/labs/articles/threat-intelligence/ddos-attack-trends-for-2020
Details Url 2
https://www.aha.org/system/files/media/file/2021/03/distributed-denial-of-
Details Url 2
https://www.eeas.europa.eu/sites/default/files/documents/2023/eeas-datateam-threatreport-2023..pdf
Details Url 2
https://stixproject.github.io
Details Url 1
https://carnegieendowment.org/research/2023/03/phase-based-tactical-analysis-of-online-operations?lang=en
Details Url 2
https://www.ofcom.org.uk/news-centre/2022/one-in-three-internet-users-fail-to-question-misinformation
Details Url 2
https://www.apa.org/monitor/2022/06/news-misinformation-attack
Details Url 2
https://www.first.org/standards/frameworks/psirts/psirt_services_framework_v1.1
Details Url 2
https://www.first.org/global/sigs/vulnerability-coordination/multiparty/guidelines-v1.1
Details Url 2
https://github.blog/2022-03-28-how-to-secure-your-end-to-end-supply-chain-on-github