Click here to download all references as Bib-File.•
| 2025-04-25
⋅
HiSolutions
⋅
Rolling in the Deep(Web): Lazarus Tsunami InvisibleFerret tsunami TsunamiKit |
| 2025-04-21
⋅
Trellix
⋅
Unmasking the Evolving Threat: A Deep Dive into the Latest Version of Lumma InfoStealer with Code Flow Obfuscation Lumma Stealer |
| 2025-04-16
⋅
VirusTotal
⋅
b804ab085f7cf9ee546d586b36ebbeb73f874205b8fae048760dee78375ddf40 Unidentified 121 |
| 2025-04-08
⋅
Trustwave
⋅
A deep Dive into the Leaked Black Basta Chat Logs Black Basta Black Basta |
| 2025-03-28
⋅
Trend Micro
⋅
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure DarkWisp SilentPrism Kematian Stealer Rhadamanthys Stealc Water Gamayun |
| 2025-03-14
⋅
K7 Security
⋅
Android Banking Trojan – OctoV2, masquerading as Deepseek AI Coper |
| 2025-03-03
⋅
DeXpose
⋅
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism PureLogs Stealer |
| 2025-02-13
⋅
Securonix
⋅
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks RandomQuery |
| 2025-01-15
⋅
0x0d4y
⋅
[BabbleLoader] A Deep Dive into EDR and Machine Learning-Based Endpoint Protection Evasion |
| 2025-01-08
⋅
CISO Series
⋅
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details Natohub |
| 2024-12-11
⋅
Sublime
⋅
Xloader deep dive: Link-based malware delivery via SharePoint impersonation Xloader Formbook |
| 2024-11-18
⋅
TEHTRIS
⋅
Cryptbot downloader: A deep cryptanalysis CryptBot |
| 2024-11-15
⋅
Volexity
⋅
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA lightSpy LIGHTSPY BH_A006 DEEPDATA DEEPPOST BrazenBamboo |
| 2024-11-12
⋅
Blackberry
⋅
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign DEEPDATA |
| 2024-11-04
⋅
Israel National Cyber Directorate (INCD)
⋅
Deep Drive Analysis of the BeaverTail Infostealer BeaverTail |
| 2024-10-23
⋅
Trend Micro
⋅
Unmasking Prometei: A Deep Dive Into Our MXDR Findings Prometei |
| 2024-10-18
⋅
SpyCloud
⋅
A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem |
| 2024-10-11
⋅
zimperium
⋅
Expanding the Investigation: Deep Dive into Latest TrickMo Samples TrickMo |
| 2024-10-03
⋅
Securonix
⋅
SHROUDED#SLEEP: A Deep Dive into North Korea’s Ongoing Campaign Against Southeast Asia |
| 2024-09-24
⋅
K7 Security
⋅
From LNK to RAT: Deep Dive into the LNK Malware Infection Chain |