Dataset Viewer
Auto-converted to Parquet Duplicate
URL
stringlengths
33
171
Text
stringlengths
1.12k
28.6k
Prompt
stringlengths
1.63k
29.1k
https://www.seqrite.com/blog/sidecopys-multi-platform-onslaught-leveraging-winrar-zero-day-and-linux-variant-of-ares-rat/
SEQRITE Labs APT-Team has discovered multiple campaigns of APT [PLACEHOLDER], targeting Indian government and defense entities in the past few months. The threat group is now exploiting the recent WinRAR vulnerability CVE-2023-38831 (See our advisory for more details) to deploy AllaKore RAT, DRat and additional payload...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
https://csirt-cti.net/2024/01/23/stately-taurus-targets-myanmar/
The recent ethnic rebel attacks in Myanmar have put the Myanmar junta and surrounding countries on high alert. Since October 2023, a rebel alliance called the Three Brotherhood Alliance (3BHA) has been attacking Myanmar’s military across its northern regions, reportedly seizing its junta outposts and military positions...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
https://unit42.paloaltonetworks.com/stately-taurus-attacks-se-asian-government/
An advanced persistent threat (APT) group suspected with moderate-high confidence to be [PLACEHOLDER] engaged in a number of cyberespionage intrusions targeting a government in Southeast Asia. The intrusions took place from at least the second quarter of 2021 to the third quarter of 2023. Based on our observations and ...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
https://medium.com/@zyadlzyatsoc/comprehensive-analysis-of-emotet-malware-part-1-by-zyad-elzyat-35d5cf33a3c0
[PLACEHOLDER], a notorious name in the realm of cyber threats, has loomed large over the digital landscape since its inception in 2014. Originally identified as a banking Trojan focused on financial data theft, [PLACEHOLDER] has evolved into a highly adaptable and multifaceted malware, capable of causing widespread dis...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
https://www.fortinet.com/blog/threat-research/bandook-persistent-threat-that-keeps-evolving
Bandook malware is a remote access trojan that has been continuously developed since it was first detected in 2007. It has been used in various campaigns by different threat actors over the years. FortiGuard Labs identified a new Bandook variant being distributed via a PDF file this past October. This PDF file contains...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
https://research.checkpoint.com/2024/sharp-dragon-expands-towards-africa-and-the-caribbean/
Since 2021, Check Point Research has been closely monitoring the activities of [PLACEHOLDER], a Chinese threat actor. Historical activities mostly consist of highly-targeted phishing emails, previously leading to the deployment of VictoryDLL or Soul framework. While the final payloads [PLACEHOLDER] operators have de...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
Since mid-April 2024, Microsoft Threat Intelligence has observed the threat actor [PLACEHOLDER] misusing the client management tool Quick Assist to target users in social engineering attacks. [PLACEHOLDER] is a financially motivated cybercriminal group known to deploy [PLACEHOLDER] ransomware. The observed activity beg...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia
[PLACEHOLDER] has been actively targeting organizations in Colombia and Ecuador since at least 2019. It relies on spear-phishing emails sent to specific and strategic companies to conduct its campaigns. On Feb. 20, the BlackBerry Research and Intelligence team witnessed a new campaign where the threat actor impersonate...
You are given a threat report that describes a cyber incident. Any direct mentions of the threat actor group, specific campaign names, or malware names responsible have been replaced with [PLACEHOLDER]. Your task is to analyze the report and attribute the incident to a known threat actor based on the techniques, tactic...
https://research.checkpoint.com/2023/blindeagle-targeting-ecuador-with-sharpened-tools/
"ACTIVE CAMPAIGNS AGAINST COLOMBIAN TARGETS For the last few months, we have been observing the ong(...TRUNCATED)
"You are given a threat report that describes a cyber incident. Any direct mentions of the threat ac(...TRUNCATED)
https://cloud.google.com/blog/topics/threat-intelligence/turla-galaxy-opportunity/
"USB Spreading As Mandiant recently wrote about in our blog post, Always Another Secret: Lifting th(...TRUNCATED)
"You are given a threat report that describes a cyber incident. Any direct mentions of the threat ac(...TRUNCATED)
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
3