Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-28cyber5wcyber5w, M4lcode
CyberGate Technical Analysis
CyberGate
2024-07-25TEHTRISTEHTRIS
Daolpu Infostealer: Full analysis of the latest malware exploited post CrowdStrike outage
Daolpu
2024-07-15ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Kematian Stealer Technical Malware Analysis
Kematian Stealer
2024-07-14Medium b.magnezi0xMrMagnezi
Malware Analysis - Rhadamanthys
Rhadamanthys
2024-07-11NCSC SwitzerlandNCSC Switzerland
Brief technical analysis of the "Poseidon Stealer" malware
Poseidon Stealer
2024-06-30ZW01fMohamed Ezat
Deep Analysis of Snake (404 keylogger)
404 Keylogger
2024-06-17splunkSplunk Threat Research Team
LNK or Swim: Analysis & Simulation of Recent LNK Phishing
2024-06-15Medium b.magnezi0xMrMagnezi
Malware Analysis FormBook
Formbook
2024-06-12GoogleGoogle Threat Analysis Group, Mandiant
Insights on Cyber Threats Targeting Users and Enterprises in Brazil
TraderTraitor
2024-06-10ZscalerManisha Ramcharan Prajapati, Muhammed Irfan V A
Technical Analysis of the Latest Variant of ValleyRAT
ValleyRAT
2024-06-06CrowdStrikeAlexandru Dinu, Dragoș Corlătescu, Mihaela Găman, Paul Sumedrea
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis
2024-06-06Medium b.magnezi0xMrMagnezi
Agent Tesla Analysis
Agent Tesla
2024-06-06Medium b.magnezi0xMrMagnezi
Remcos RAT Analysis
Remcos
2024-06-05QuoIntelligenceAlixia Clarisse Rutayisire
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats
Dragonbridge
2024-06-05SSTICCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Video)
FlowCloud
2024-06-05SekoiaCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Paper)
FlowCloud
2024-06-05SekoiaCharles Meslay
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides)
FlowCloud
2024-06-03CyfoxIdan Malihi
BiBi Wiper: A Malware Analysis Amidst the Israel-Hamas-ISIS Conflict
BiBi
2024-06-03Binary DefenseBinary Defense, Shannon Mong
Wineloader – Analysis of the Infection Chain
WINELOADER
2024-05-28ReliaquestRELIAQUEST THREAT RESEARCH TEAM
BlackSuit Attack Analysis
BlackSuit