Click here to download all references as Bib-File.•
2022-09-08
⋅
Center for European Policy Analysis
⋅
Russian Cyberwarfare: Unpacking the Kremlin’s Capabilities |
2022-09-07
⋅
Google
⋅
Initial access broker repurposing techniques in targeted attacks against Ukraine AnchorMail Cobalt Strike IcedID |
2022-09-06
⋅
PRODAFT
⋅
TA505 Group’s TeslaGun In-Depth Analysis Clop ServHelper |
2022-09-06
⋅
Github (muha2xmad)
⋅
Technical analysis of SharkBot android malware SharkBot |
2022-09-05
⋅
PRODAFT
⋅
TA505 Group’s TeslaGun In-Depth Analysis ServHelper |
2022-09-05
⋅
Infinitum IT
⋅
Bumblebee Loader Malware Analysis BumbleBee |
2022-09-02
⋅
Cloudsek
⋅
What Is Redeemer Ransomware and How Does It Spread: A Technical Analysis |
2022-09-01
⋅
muha2xmad
⋅
Technical analysis of SOVA android malware S.O.V.A. |
2022-08-31
⋅
SecurityScorecard
⋅
Analysis of APT35 Infrastructure Reveals Interest in Egyptian Shipping Companies |
2022-08-30
⋅
Github (vc0RExor)
⋅
SmokeLoader - Quick-Analysis SmokeLoader |
2022-08-30
⋅
ANY.RUN
⋅
Raccoon Stealer 2.0 Malware analysis Raccoon RecordBreaker |
2022-08-29
⋅
Cyfirma
⋅
CosmicDuke Malware Analysis Report CosmicDuke |
2022-08-29
⋅
CYBER GEEKS All Things Infosec
⋅
A Technical Analysis of Pegasus for Android – Part 1 Chrysaor |
2022-08-25
⋅
⋅
SK Shieldus
⋅
Ghost Ransomware Response and Attack Analysis Report Gwisin |
2022-08-25
⋅
splunk
⋅
AppLocker Rules as Defense Evasion: Complete Analysis Azorult |
2022-08-25
⋅
muha2xmad
⋅
Technical analysis of IRATA android malware IRATA |
2022-08-24
⋅
Elastic
⋅
QBOT Malware Analysis QakBot |
2022-08-23
⋅
Darktrace
⋅
Emotet Resurgence: Cross-Industry Campaign Analysis Emotet |
2022-08-17
⋅
Secureworks
⋅
DarkTortilla Malware Analysis Agent Tesla AsyncRAT Cobalt Strike DarkTortilla Nanocore RAT RedLine Stealer |
2022-08-16
⋅
Qualys
⋅
AsyncRAT C2 Framework: Overview, Technical Analysis & Detection AsyncRAT |