Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-04-13Universit ́e Catholique de LouvainAxel Legay, Charles-Henry Bertrand Van Ouytsel
Malware Analysis with Symbolic Execution and Graph Kernel
2022-04-12Twitter (@silascutler)Silas Cutler
Tweet on analysis of CADDYWIPER used alongside with INDUSTROYER2
CaddyWiper INDUSTROYER2
2022-04-12LIFARSVlad Pasca
A Detailed Analysis of The SunCrypt Ransomware
SunCrypt
2022-04-12AhnLabASEC Analysis Team
SystemBC Being Used by Various Attackers
Emotet SmokeLoader SystemBC
2022-04-11Seguranca InformaticaPedro Tavares
Analysis of the SunnyDay ransomware
Curator
2022-04-11Qianxin Threat Intelligence CenterRed Raindrop Team
Snow Abuse: Analysis of the Suspected Lazarus Attack Activities against South Korean Companies
2022-04-10BrandefenseBrandefense
Zebrocy Malware Technical Analysis Report
Zebrocy
2022-04-06TRM LabsTRM Labs
TRM Analysis Corroborates Suspected Ties Between Conti and Ryuk Ransomware Groups and Wizard Spider
Conti Ryuk
2022-04-06Github (albertzsigovits)Albert Zsigovits
Yanluowang Ransomware Analysis
Yanluowang
2022-04-06Medium mars0xMars
WannaHusky Malware Analysis w/ YARA + TTPs
WannaHusky
2022-04-05eSentireeSentire Threat Response Unit (TRU)
eSentire Threat Intelligence Malware Analysis: HeaderTip
HeaderTip
2022-04-05eSentireeSentire Threat Response Unit (TRU)
eSentire Threat Intelligence Malware Analysis: DoubleZero
DoubleZero
2022-04-05AhnLabASEC Analysis Team
Malicious Word Documents Using MS Media Player (Impersonating AhnLab)
2022-04-05MorphisecMichael Dereviashkin
New Analysis: The CaddyWiper Malware Attacking Ukraine
CaddyWiper
2022-04-04CloudsekAnirudh Batra
Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant
2022-04-02Github (pl-v)Player-V
Emotet Analysis Part 1: Unpacking
Emotet
2022-04-02institute for advanced threats360 Threat Intelligence Center
WAVES LURKING IN THE CALM OF THE WIND AND WAVES: A DYNAMIC ANALYSIS OF THE ATTACK ACTIVITIES OF THE APT-C-00 (SEALOTUS) ORGANIZATION
2022-03-31eSentireeSentire Threat Response Unit (TRU)
eSentire Threat Intelligence Malware Analysis: CaddyWiper
CaddyWiper
2022-03-31LunasecChris Thompson, Forrest Allison, Free Wortley
Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring
2022-03-31Cyble
Deep Dive Analysis - Borat RAT
Borat RAT