Click here to download all references as Bib-File.•
2022-09-02
⋅
Cloudsek
⋅
What Is Redeemer Ransomware and How Does It Spread: A Technical Analysis |
2022-09-01
⋅
muha2xmad
⋅
Technical analysis of SOVA android malware S.O.V.A. |
2022-08-31
⋅
SecurityScorecard
⋅
Analysis of APT35 Infrastructure Reveals Interest in Egyptian Shipping Companies |
2022-08-30
⋅
Github (vc0RExor)
⋅
SmokeLoader - Quick-Analysis SmokeLoader |
2022-08-30
⋅
ANY.RUN
⋅
Raccoon Stealer 2.0 Malware analysis Raccoon RecordBreaker |
2022-08-29
⋅
Cyfirma
⋅
CosmicDuke Malware Analysis Report CosmicDuke |
2022-08-29
⋅
CYBER GEEKS All Things Infosec
⋅
A Technical Analysis of Pegasus for Android – Part 1 Chrysaor |
2022-08-25
⋅
⋅
SK Shieldus
⋅
Ghost Ransomware Response and Attack Analysis Report Gwisin |
2022-08-25
⋅
splunk
⋅
AppLocker Rules as Defense Evasion: Complete Analysis Azorult |
2022-08-25
⋅
muha2xmad
⋅
Technical analysis of IRATA android malware IRATA |
2022-08-24
⋅
Elastic
⋅
QBOT Malware Analysis QakBot |
2022-08-23
⋅
Darktrace
⋅
Emotet Resurgence: Cross-Industry Campaign Analysis Emotet |
2022-08-17
⋅
Secureworks
⋅
DarkTortilla Malware Analysis Agent Tesla AsyncRAT Cobalt Strike DarkTortilla Nanocore RAT RedLine Stealer |
2022-08-16
⋅
Qualys
⋅
AsyncRAT C2 Framework: Overview, Technical Analysis & Detection AsyncRAT |
2022-08-16
⋅
⋅
Infinitum IT
⋅
FluBot Android Malware Analysis FluBot |
2022-08-15
⋅
Microsoft
⋅
Disrupting SEABORGIUM’s ongoing phishing operations Callisto |
2022-08-15
⋅
⋅
Weixin
⋅
Analysis of the characteristics of new activities organized by Patchwork APT in South Asia |
2022-08-15
⋅
Microsoft
⋅
Disrupting SEABORGIUM’s ongoing phishing operations |
2022-08-13
⋅
AlienVault OTX
⋅
An Analysis of Infrastructure linked to the Hagga Threat Actor Hagga |
2022-08-13
⋅
Silentpush
⋅
Early Analysis of the Twilio phishing attack-it is the tip of the iceberg |