Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-24CertegoFederico Fantini
Malware Analysis - Inside Lumma Stealer
Lumma Stealer
2025-06-20Github (VenzoV)VenzoV
Analysis of Amatera Stealer v1 (Test build)
Amatera
2025-06-16Glueck KanjaPascal Asch
Inside Akira Stealer: A full technical analysis of a modular stealer
Akira Stealer
2025-06-13ThreatMonThreatMon
Pulsar RAT: Technical Malware Analysis Report
Pulsar RAT
2025-06-12eSentireeSentire Threat Response Unit (TRU)
Don't Get Caught in the Headlights - DeerStealer Analysis
DeerStealer
2025-06-09GeniansGenians
Analysis of the Triple Combo Threat of the Kimsuky Group
FlowerPower Appleseed BabyShark
2025-06-05MandiantMandiant
Hello, Operator? A Technical Analysis of Vishing Threats
UNC6040
2025-06-05Mobile-Hackermh
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
SpyMax
2025-06-03IBM X-ForceMelissa Frydrych
IBM X-Force Threat Analysis: DCRat presence growing in Latin America
DCRat PhantomVAI
2025-06-03K7 SecurityPraveen Babu
In-depth Analysis of a 2025 ViperSoftX Variant
ViperSoftX
2025-06-03ANY.RUNANY.RUN
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals
BeaverTail OtterCookie InvisibleFerret
2025-05-28Medium (@mvaks)mvaks
Bombardino Crocodilo in Poland — analysis of IKO Lokaty mobile malware campaign
Crocodilus
2025-05-15Medium b.magnezi0xMrMagnezi
Ave Maria Malware Analysis
Ave Maria
2025-05-14ZscalerThreatLabZ research team
Technical Analysis of TransferLoader
TransferLoader
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-08ForescoutLuca Barba, Sai Molige
Threat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat Actor
Chaya_004
2025-04-30ZAYOTEMTamer Burak Telseren
Oski Stealer Technical Analysis Report 2025
Oski Stealer
2025-04-240xreverseUtku Çorbacı
Understanding Alcatraz ~ Obfuscator Analysis [EN]
2025-04-23Medium b.magnezi0xMrMagnezi
AsyncRAT Malware Analysis
AsyncRAT
2025-04-15Orange CyberdefenseAndré Henschel, Friedl Holzner
CyberSOC Insights: Analysis of a Black Basta Attack Campaign
Black Basta DarkGate Lumma Stealer