Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-04-11NCSC UKMinistry of Defense, NCSC UK
Malware Analysis Report: DAMASCENED PEACOCK
MeltingClaw
2025-04-09nvisoNVISO
BRICKSTORM Backdoor Analysis
BRICKSTORM
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Technical analysis and mitigations
badbazaar
2025-04-03ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Ransomhub Group & New Betruger Backdoor Technical Malware Analysis Report
2025-03-26eSentireeSentire Threat Response Unit (TRU)
The Long and Short(cut) of It: KoiLoader Analysis
Koi Loader
2025-03-26ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report
AsyncRAT
2025-03-18TrellixJambul Tologonov, John Fokker
Analysis of Black Basta Ransomware Chat Leaks
Black Basta Black Basta
2025-03-12Youtube (AhmedS Kasmani)AhmedS Kasmani
Initial Analysis of Black Basta Chat Leaks
Black Basta Black Basta
2025-03-07MalwareAnalysisSpaceSeeker
Akira Ransomware Expands to Linux: the attacking abilities and strategies
Akira
2025-03-06Outpost24KrakenLabs
Unveiling EncryptHub: Analysis of a multi-stage malware campaign
Rhadamanthys
2025-03-04Medium (A-poc)A-poc
Black Basta Leak Analysis
Black Basta Black Basta
2025-03-04GeniansGenians
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack
Quasar RAT
2025-03-03DeXposeDeXpose
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
PureLogs Stealer
2025-03-01ZW01fMohamed Ezat
An in-depth analysis of APT37’s latest campaign
RokRAT
2025-02-28Positive TechnologiesDenis Kazakov, Sergey Samokhin
The evolution of Dark Caracal tools: analysis of a campaign featuring Poco RAT
Bandook
2025-02-27Medium b.magnezi0xMrMagnezi
NanoCore Malware Analysis
Nanocore RAT
2025-02-24DeXposeDeXpose
Six Months Undetected: Analysis of archive.org hosted .NET PE Injector
2025-02-190x0d4y0x0d4y
Technical Analysis of Lockbit4.0 Evasion Tales
LockBit
2025-02-13ZscalerThreatLabZ research team, Zscaler
Technical Analysis of Xloader Versions 6 and 7 | Part 2
Xloader
2025-02-09Medium (@mvaks)mvaks
Analysis of malicious mobile applications impersonating popular Polish apps — OLX, Allegro, IKO
SpyNote TrickMo