Click here to download all references as Bib-File.•
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Double Encoded Malicious Powershell |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Powershell ( Part 4 ) |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious JAR ( Part 3 ) |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious JAR ( Part 2 ) |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious JAR ( Part 1 ) |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Shellcode ( HTA as Dropper ) Part 2 |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Shellcode ( HTA as Dropper ) Part 1 |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious LNK Part 2 |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Powershell Part 2 |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Javascript |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Batch Script |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious HTA |
| 2025-07-14
⋅
Reverse The Malware
⋅
Analysis Malicious LNK File |
| 2025-07-14
⋅
Reverse The Malware
⋅
Analysis Malicious VBS Script |
| 2025-07-14
⋅
Reverse The Malware
⋅
Analysis Malicious Powershell Script |
| 2025-07-14
⋅
Socket
⋅
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader BeaverTail InvisibleFerret |
| 2025-07-14
⋅
Arda Büyükkaya
⋅
GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates Global |
| 2025-07-13
⋅
cocomelonc
⋅
Mobile malware development trick 1. Abuse Telegram Bot API. Simple Android (Java/Kotlin) stealer example. |
| 2025-07-12
⋅
t0ast's blog
⋅
Global Group: Ransomware-as-a-Service with AI-powered Negotiation Global |
| 2025-07-11
⋅
Authentic8
⋅
Cyber Intel Brief: NightEagle APT, AI deepfakes, SPNEGO flaw NightEagle |