Click here to download all references as Bib-File.•
2024-10-17
⋅
Github (ssrdio)
⋅
Analysis of BeaverTail & InvisibleFerret activity BeaverTail InvisibleFerret |
2024-10-16
⋅
ThreatMon
⋅
X-ZIGZAG Technical Malware Analysis Report AsyncRAT X-ZIGZAG |
2024-10-15
⋅
⋅
Weixin
⋅
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia Unidentified 117 (Donot Loader) |
2024-10-11
⋅
Nextron Systems
⋅
In-Depth Analysis of Lynx Ransomware Lynx |
2024-10-10
⋅
NCSC Switzerland
⋅
Brief technical analysis of the "Gorilla" botnet Gorilla Gorilla |
2024-10-10
⋅
Zscaler
⋅
Technical Analysis of DarkVision RAT DarkVision RAT |
2024-10-06
⋅
Google
⋅
Caught in the wild - Past, present and future |
2024-10-05
⋅
Malware Analysis - Lumma Stealer Lumma Stealer |
2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 2 Stealc |
2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 1 Stealc |
2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 3 Stealc |
2024-10-02
⋅
ThreatMon
⋅
Amnesia Stealer Technical Malware Analysis Report BlankGrabber |
2024-10-01
⋅
Cybereason
⋅
THREAT ANALYSIS: Beast Ransomware win.beast |
2024-09-26
⋅
ESET Research
⋅
Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023 |
2024-09-25
⋅
Medium b.magnezi
⋅
Lumma Stealer - Malware Analysis Lumma Stealer |
2024-09-21
⋅
Malware Analysis - PXRECVOWEIWOEI 0bj3ctivityStealer |
2024-09-10
⋅
ThreatMon
⋅
Ailurophile Stealer Technical Malware Analysis Report |
2024-09-06
⋅
splunk
⋅
Handala’s Wiper: Threat Analysis and Detections Handala Hatef Handala |
2024-09-04
⋅
ANY.RUN
⋅
AZORult Malware: Technical Analysis Azorult |
2024-08-28
⋅
ESET Research
⋅
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office SpyGrace |