Click here to download all references as Bib-File.•
2022-06-30
⋅
Cyber Geeks (CyberMasterV)
⋅
How to Expose a Potential Cybercriminal due to Misconfigurations Loki Password Stealer (PWS) |
2022-06-13
⋅
SecurityScorecard
⋅
A Detailed Analysis Of The Last Version Of REvil Ransomware (Download PDF) REvil |
2022-05-02
⋅
LIFARS
⋅
A Deep Dive into AvosLocker Ransomware AvosLocker |
2022-04-12
⋅
LIFARS
⋅
A Detailed Analysis of The SunCrypt Ransomware SunCrypt |
2022-03-28
⋅
Cyber Geeks (CyberMasterV)
⋅
A Step-by-Step Analysis of the Russian APT Turla Backdoor called TinyTurla TinyTurla |
2022-02-28
⋅
Cyber Geeks
⋅
How to Analyze Malicious Documents – Case Study of an Attack Targeting Ukrainian Organization |
2022-02-24
⋅
LIFARS
⋅
How to Decrypt the Files Encrypted by the Hive Ransomware Hive Hive |
2022-02-14
⋅
LIFARS
⋅
A Detailed Analysis of The LockBit Ransomware LockBit LockBit |
2022-01-31
⋅
Cyber Geeks
⋅
A Detailed Analysis Of Lazarus APT Malware Disguised As Notepad++ Shell Extension AnchorMTea |
2022-01-20
⋅
LIFARS
⋅
A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations WhisperGate |
2021-12-30
⋅
LIFARS
⋅
A Deep Dive into The Grief Ransomware’s Capabilities DoppelPaymer |
2021-09-07
⋅
LIFARS
⋅
A Detailed Analysis of Lazarus’ RAT Called FALLCHILL Volgmer |
2021-09-02
⋅
LIFARS
⋅
Vjw0rm Worm/RAT Vjw0rm |
2021-08-13
⋅
LIFARS
⋅
Makop Ransomware Makop Ransomware |
2021-08-10
⋅
LIFARS
⋅
A Detailed Analysis of The Last Version of Conti Ransomware Conti |