Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-06GoogleClement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-10-05Mandar Naik
Malware Analysis - Lumma Stealer
Lumma Stealer
2024-10-03LexfoLexfo
StealC Malware Analysis Part 2
Stealc
2024-10-03LexfoLexfo
StealC Malware Analysis Part 1
Stealc
2024-10-03LexfoLexfo
StealC Malware Analysis Part 3
Stealc
2024-10-02ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Amnesia Stealer Technical Malware Analysis Report
BlankGrabber
2024-10-01CybereasonMark Tsipershtein
THREAT ANALYSIS: Beast Ransomware
win.beast
2024-09-26ESET ResearchZoltán Rusnák
Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023
2024-09-25Medium b.magnezi0xMrMagnezi
Lumma Stealer - Malware Analysis
Lumma Stealer
2024-09-21Mandar Naik
Malware Analysis - PXRECVOWEIWOEI
0bj3ctivityStealer
2024-09-10ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Ailurophile Stealer Technical Malware Analysis Report
2024-09-06splunkSplunk Threat Research Team
Handala’s Wiper: Threat Analysis and Detections
Handala Hatef Handala
2024-09-04ANY.RUNANY.RUN, Mostafa ElSheimy
AZORult Malware: Technical Analysis
Azorult
2024-08-28ESET ResearchRomain Dumont
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
SpyGrace
2024-08-28ESET ResearchESET Research
ESET Research: Spy group exploits WPS Office zero day; analysis uncovers a second vulnerability
SpyGrace
2024-08-22S2W Inc.S2W
Analysis of the North Korea-backed puNK-003’s Lilith RAT ported to AutoIt Script
Lilith puNK-003
2024-08-21ZscalerRuchna Nigam
Technical Analysis of Copybara
Copybara
2024-08-20ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
CyberVolk Ransomware Technical Malware Analysis Report
2024-08-09BreachNovaOsama Ellahi
Full analysis on NJRAT
NjRAT
2024-08-07ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
AzzaSec Ransomware Technical Malware Analysis
HiddenTear