Click here to download all references as Bib-File.•
2023-01-01
⋅
ThreatMon
⋅
Chaos Unleashed: a Technical Analysis of a Novel Ransomware Chaos |
2023-01-01
⋅
ThreatMon
⋅
Python's Dark Side When Crafting a Wallet Stealer Becomes Disturbingly Effortless |
2023-01-01
⋅
ThreatMon
⋅
Stealing in Stealth: Investigating a Python-based Evasive Malware Exela |
2023-01-01
⋅
ThreatMon
⋅
Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack Kimsuky |
2023-01-01
⋅
ThreatMon
⋅
The Konni APT Chronicle: Tracing Their Intelligence-Driven Attack Chain Konni |
2023-01-01
⋅
ThreatMon
⋅
Serpent Stealer Unmasked: Threat Analysis and Countermeasures |
2023-01-01
⋅
ThreatMon
⋅
The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT AllaKore |
2023-01-01
⋅
Objective-See
⋅
The Mac Malware of 2022 |
2022-12-31
⋅
Jaalma's Blog
⋅
Analyzing a VIDAR Infostealer Sample Vidar |
2022-12-30
⋅
Interlab
⋅
Cyber Threat Report: RambleOn Android Malware - Detailed analysis report of cyber threat targeting journalist in South Korea through APT phishing campaign with malicious APK RambleOn |
2022-12-30
⋅
GOV.PL
⋅
Russian cyberattacks NoName057(16) |
2022-12-30
⋅
Cyber And Ramen blog
⋅
A Quick Look at ELF Bifrose (Part 1) Bifrost |
2022-12-29
⋅
The Record
⋅
This app will self-destruct: How Belarusian hackers created an alternative Telegram for activists Cyber Partisans |
2022-12-29
⋅
ThreatMon
⋅
Mars Stealer Analysis Mars Stealer |
2022-12-29
⋅
Minerva Labs
⋅
New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection CatB |
2022-12-28
⋅
⋅
NSFOCUS
⋅
Analysis of Cyber Attacks by APT Organization Confucius Against IBO Anti-Terrorism Operations in Pakistan Confucius Confucious |
2022-12-28
⋅
ZeroFox
⋅
The Underground Economist: Volume 2, Issue 24 AresLoader |
2022-12-28
⋅
Orange Cyberdefense
⋅
PLAYing the game PLAY |
2022-12-28
⋅
HTML Smuggling Detection QakBot |
2022-12-27
⋅
cyble
⋅
Pure coder offers multiple malware for sale in Darkweb forums PureLogs Stealer |