Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Chaos Unleashed: a Technical Analysis of a Novel Ransomware
Chaos
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Python's Dark Side When Crafting a Wallet Stealer Becomes Disturbingly Effortless
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Stealing in Stealth: Investigating a Python-based Evasive Malware Exela
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack
Kimsuky
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Konni APT Chronicle: Tracing Their Intelligence-Driven Attack Chain
Konni
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Serpent Stealer Unmasked: Threat Analysis and Countermeasures
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT
AllaKore
2023-01-01Objective-SeePatrick Wardle
The Mac Malware of 2022
2022-12-31Jaalma's BlogJaalma
Analyzing a VIDAR Infostealer Sample
Vidar
2022-12-30InterlabOvi Liber
Cyber Threat Report: RambleOn Android Malware - Detailed analysis report of cyber threat targeting journalist in South Korea through APT phishing campaign with malicious APK
RambleOn
2022-12-30GOV.PLGovernment Plenipotentiary for the Security of Information Space of the Republic of Poland
Russian cyberattacks
NoName057(16)
2022-12-30Cyber And Ramen blogCYBER&RAMEN
A Quick Look at ELF Bifrose (Part 1)
Bifrost
2022-12-29The RecordDaryna Antoniuk
This app will self-destruct: How Belarusian hackers created an alternative Telegram for activists
Cyber Partisans
2022-12-29ThreatMonThreatMon Malware Research Team
Mars Stealer Analysis
Mars Stealer
2022-12-29Minerva LabsNatalie Zargarov
New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection
CatB
2022-12-28NSFOCUSFuying Laboratory
Analysis of Cyber Attacks by APT Organization Confucius Against IBO Anti-Terrorism Operations in Pakistan
Confucius Confucious
2022-12-28ZeroFoxDARK OPS
The Underground Economist: Volume 2, Issue 24
AresLoader
2022-12-28Orange CyberdefenseOrange CyberSOC
PLAYing the game
PLAY
2022-12-28Micah Babinski
HTML Smuggling Detection
QakBot
2022-12-27cybleCyble
Pure coder offers multiple malware for sale in Darkweb forums
PureLogs Stealer