Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-12Medium (@mvaks)mvaks
Two tales and one Antidot(e) — a new mobile malware campaign in Poland
Antidot
2025-02-09Medium (@mvaks)mvaks
Analysis of malicious mobile applications impersonating popular Polish apps — OLX, Allegro, IKO
SpyNote TrickMo
2025-01-20Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
Qbot is Back.Connect
ReedBed UNC4393
2024-12-30Medium TRAC LabsTRAC Labs
Advancing Through the Cyberfront, LegionLoader Commander
Satacom
2024-12-28Medium s.lontzetidisEfstratios Lontzetidis
Lumma 2024: Dominating the Info-Stealer Market
Lumma Stealer
2024-12-19Medium walmartglobaltechJason Reaves
Decoding RevC2 strings
RevC2
2024-12-13Medium 0x_b0mb3rLouis Schürmann
Technical Analysis: Magecart Skimmer
magecart
2024-12-02Medium b.magnezi0xMrMagnezi
LokiBot Malware Analysis
Loki Password Stealer (PWS)
2024-11-22Medium (@lcam)Luca Mella
How to target European SME with Ransomware? Through Zyxel!
HellDown Babuk
2024-11-04Medium (@DCSO_CyTec)Denis Szadkowski, Johann Aydinbas, Maike Orlikowski, Paul van Ramesdonk
Unransomware: From Zero to Full Recovery in a Blink
Akira
2024-10-28Medium shaddy43Shayan Ahmed Khan
Emotet Malware Analysis
Emotet
2024-09-25Medium b.magnezi0xMrMagnezi
Lumma Stealer - Malware Analysis
Lumma Stealer
2024-07-14Medium b.magnezi0xMrMagnezi
Malware Analysis - Rhadamanthys
Rhadamanthys
2024-06-19Medium walmartglobaltechJason Reaves, Joshua Platt
Spectre (SPC) v9 Campaigns and Updates
Spectre Rat
2024-06-17medium Andrew PetusAndrew Petus
Reverse Engineering Redosdru String Decryption
Redosdru
2024-06-15Medium b.magnezi0xMrMagnezi
Malware Analysis FormBook
Formbook
2024-06-13Medium (@zyadlzyatsoc)Zyad Elzyat
Inside LATRODECTUS: A Dive into Malware Tactics and Mitigation
Latrodectus
2024-06-06Medium b.magnezi0xMrMagnezi
Agent Tesla Analysis
Agent Tesla
2024-06-06Medium b.magnezi0xMrMagnezi
Remcos RAT Analysis
Remcos
2024-05-29Medium (DoingFedTime)DoingFedTime
80-000 records exposed in shell data breach by threat actor
Threat Actor 888