Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Solving the Puzzle: Reversing the New Stealer Jigsaw
Jigsaw
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Unmasking Stealer X1na: A Technical Analysis of the Latest Threat
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
NestJS Stealer: Unraveling the Inner Workings of a New Cybersecurity Menace
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
RAT Goes Phishing: Dissecting the Stealthy Techniques of REM Phishing RAT
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Chaos Unleashed: a Technical Analysis of a Novel Ransomware
Chaos
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Python's Dark Side When Crafting a Wallet Stealer Becomes Disturbingly Effortless
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Stealing in Stealth: Investigating a Python-based Evasive Malware Exela
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack
Kimsuky
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Konni APT Chronicle: Tracing Their Intelligence-Driven Attack Chain
Konni
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Serpent Stealer Unmasked: Threat Analysis and Countermeasures
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT
AllaKore
2022-12-29ThreatMonThreatMon Malware Research Team
Mars Stealer Analysis
Mars Stealer
2022-12-21TrendmicroByron Gelera, Don Ovid Ladores, Ivan Nicole Chavez, Khristian Joseph Morales, Monte de Jesus
Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks
Royal Ransom
2022-12-21Team CymruS2 Research Team
Inside the IcedID BackConnect Protocol
IcedID
2022-12-16SekoiaJamila B., Threat & Detection Research Team
The DPRK delicate sound of cyber
AppleJeus AppleJeus SnatchCrypto
2022-12-09SecureworksSecureWorks' Counter Threat Unit Research Team
Drokbk Malware Uses GitHub as Dead Drop Resolver
Drokbk
2022-12-08Team CymruS2 Research Team
Iranian Exploitation Activities Continue as of November 2022
2022-12-06BlackberryBlackBerry Research & Intelligence Team
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets
PlugX
2022-12-05Sekoiasekoia, Threat & Detection Research Team
Calisto show interests into entities involved in Ukraine war support
2022-12-02Avast DecodedThreat Intelligence Team
Hitching a ride with Mustang Panda
PlugX