Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-17Github (ssrdio)Gregor Spagnolo
Analysis of BeaverTail & InvisibleFerret activity
BeaverTail InvisibleFerret
2024-10-16ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
X-ZIGZAG Technical Malware Analysis Report
AsyncRAT X-ZIGZAG
2024-10-15Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia
Unidentified 117 (Donot Loader)
2024-10-11Nextron SystemsNextron Threat Research Team
In-Depth Analysis of Lynx Ransomware
Lynx
2024-10-10NCSC SwitzerlandNCSC Switzerland
Brief technical analysis of the "Gorilla" botnet
Gorilla Gorilla
2024-10-10ZscalerMuhammed Irfan V A
Technical Analysis of DarkVision RAT
DarkVision RAT
2024-10-06GoogleClement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-10-05Mandar Naik
Malware Analysis - Lumma Stealer
Lumma Stealer
2024-10-03LexfoLexfo
StealC Malware Analysis Part 2
Stealc
2024-10-03LexfoLexfo
StealC Malware Analysis Part 1
Stealc
2024-10-03LexfoLexfo
StealC Malware Analysis Part 3
Stealc
2024-10-02ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Amnesia Stealer Technical Malware Analysis Report
BlankGrabber
2024-10-01CybereasonMark Tsipershtein
THREAT ANALYSIS: Beast Ransomware
win.beast
2024-09-26ESET ResearchZoltán Rusnák
Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023
2024-09-25Medium b.magnezi0xMrMagnezi
Lumma Stealer - Malware Analysis
Lumma Stealer
2024-09-21Mandar Naik
Malware Analysis - PXRECVOWEIWOEI
0bj3ctivityStealer
2024-09-10ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Ailurophile Stealer Technical Malware Analysis Report
2024-09-06splunkSplunk Threat Research Team
Handala’s Wiper: Threat Analysis and Detections
Handala Hatef Handala
2024-09-04ANY.RUNANY.RUN, Mostafa ElSheimy
AZORult Malware: Technical Analysis
Azorult
2024-08-28ESET ResearchRomain Dumont
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
SpyGrace