Click here to download all references as Bib-File.•
2024-01-31
⋅
Stairwell
⋅
Technical analysis: The silent torrent of VileRAT VileRAT EVILNUM |
2024-01-25
⋅
IBM
⋅
Broomstick Analysis Report (IRIS-17079) Broomstick |
2024-01-18
⋅
Google
⋅
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware RCS SPICA |
2024-01-17
⋅
splunk
⋅
Enter The Gates: An Analysis of the DarkGate AutoIt Loader DarkGate |
2024-01-16
⋅
ANY.RUN
⋅
A Full Analysis of the Pure Malware Family: Unique and Growing Threat PureCrypter PureLogs Stealer |
2024-01-16
⋅
ANY.RUN
⋅
A Full Analysis of the Pure Malware Family: Unique and Growing Threat PureCrypter PureLogs Stealer |
2024-01-16
⋅
ANY.RUN
⋅
A Full Analysis of the Pure Malware Family: Unique and Growing Threat PureCrypter PureLogs Stealer |
2024-01-16
⋅
Medium walmartglobaltech
⋅
Keyhole Analysis IcedID Keyhole |
2024-01-16
⋅
Medium walmartglobaltech
⋅
Keyhole Analysis IcedID Keyhole |
2024-01-16
⋅
Medium walmartglobaltech
⋅
Keyhole Analysis IcedID Keyhole |
2024-01-16
⋅
S2W LAB Inc.
⋅
Detailed Analysis of DarkGate; Investigating new top-trend backdoor malware DarkGate |
2024-01-15
⋅
nikhilh-20
⋅
NoaBot Botnet - Sandboxing with ELFEN and Analysis NoaBot |
2024-01-13
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Shellcode Analysis and C2 Extraction Cobalt Strike |
2024-01-11
⋅
Forescout
⋅
Clearing the Fog of War – A critical analysis of recent energy sector cyberattacks in Denmark and Ukraine |
2024-01-10
⋅
Medium icebre4ker
⋅
Analysis of an Info Stealer — Chapter 2: The iOS App |
2024-01-09
⋅
0x0d4y
⋅
IcedID – Technical Malware Analysis [Second Stage] IcedID PhotoLoader |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Powershell decoding and .NET C2 Extraction (Quasar RAT) Quasar RAT |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Simple Javascript Decoding and C2 Extraction (Redline Stealer) RedLine Stealer |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Javascript Malware Analysis - Decoding an AgentTesla Loader Agent Tesla |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Decoding Obfuscated Powershell and HTA Files (Lumma Stealer) Lumma Stealer |