Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Double Encoded Malicious Powershell
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell ( Part 4 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious JAR ( Part 3 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious JAR ( Part 2 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious JAR ( Part 1 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Shellcode ( HTA as Dropper ) Part 2
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Shellcode ( HTA as Dropper ) Part 1
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious LNK Part 2
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell Part 2
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Javascript
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Batch Script
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious HTA
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious LNK File
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious VBS Script
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell Script
2025-07-14SocketKirill Boychenko
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
BeaverTail InvisibleFerret
2025-07-14Arda BüyükkayaEclecticIQ Threat Research Team
GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates
Global
2025-07-13cocomelonccocomelonc
Mobile malware development trick 1. Abuse Telegram Bot API. Simple Android (Java/Kotlin) stealer example.
2025-07-12t0ast's blogt0ast
Global Group: Ransomware-as-a-Service with AI-powered Negotiation
Global
2025-07-11Authentic8A8 Team
Cyber Intel Brief: NightEagle APT, AI deepfakes, SPNEGO flaw
NightEagle