Click here to download all references as Bib-File.•
| 2026-01-23
⋅
Medium Ireneusz Tarnowski
⋅
SpyNote: Comprehensive Analysis of an Android Remote Access Trojan SpyNote |
| 2026-01-19
⋅
Swiss Post Cybersecurity
⋅
Don't Judge a PNG by Its Header: PURELOGS Infostealer Analysis PureLogs Stealer |
| 2026-01-19
⋅
OpenSourceMalware
⋅
Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware OtterCandy |
| 2026-01-16
⋅
sysdig
⋅
VoidLink threat analysis: Sysdig discovers C2-compiled kernel rootkits VoidLink |
| 2026-01-14
⋅
Jamf Blog
⋅
Predator's kill switch: undocumented anti-analysis techniques in iOS spyware Predator |
| 2026-01-14
⋅
S2W Inc.
⋅
Detailed Analysis of DragonForce Ransomware DragonForce |
| 2026-01-12
⋅
sec0wn
⋅
PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs) |
| 2026-01-04
⋅
sec0wn
⋅
From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell Cobalt Strike |
| 2025-12-27
⋅
bluecyber
⋅
APT Earth Baxia - Charon Ransomware: An In-Depth Analysis Charon |
| 2025-12-22
⋅
Medium Ireneusz Tarnowski
⋅
Operational Analysis of Communication Channels in Mobile RCS SpyFRPTunnel |
| 2025-12-21
⋅
Genians
⋅
Operation Artemis: Analysis of HWP-Based DLL Side Loading Attacks RokRAT |
| 2025-12-10
⋅
Trend Micro
⋅
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation |
| 2025-12-04
⋅
CISA
⋅
Malware Analysis Report (MAR) BRICKSTORM Backdoor BRICKSTORM |
| 2025-11-25
⋅
⋅
kienmanowar Blog
⋅
[Quick Analysis] Phishing Campaign Fake Tax Authorities to Distribute Malicious Codes VIP Keylogger |
| 2025-11-24
⋅
⋅
ISH Tecnologia
⋅
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer. |
| 2025-11-17
⋅
AhnLab
⋅
NKNShell Malware Distributed via VPN Website Larva-24010 |
| 2025-10-25
⋅
MandarNaik016
⋅
Malware Analysis - VIP Keylogger - Part 2 VIP Keylogger |
| 2025-10-19
⋅
⋅
CNCERT
⋅
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks DanderSpritz |
| 2025-10-18
⋅
Medium 0xzyadelzyat
⋅
PureLogs Stealer: Complete Malware Analysis & CTF Walkthrough PureLogs Stealer |
| 2025-10-14
⋅
Synacktiv
⋅
LinkPro: eBPF rootkit analysis LinkPro |