Click here to download all references as Bib-File.•
2024-04-19
⋅
Gold Pickaxe iOS Technical Analysis: IPA Overview and C2 Communication Start up |
2024-04-18
⋅
EchoCTI
⋅
Turla APT Analysis with TinyTurla-NG TinyTurlaNG |
2024-04-17
⋅
Microsoft
⋅
Russian US election interference targets support for Ukraine after slow start |
2024-04-17
⋅
Microsoft
⋅
Nation-states engage in US-focused influence operations ahead of US presidential election |
2024-04-16
⋅
HarfangLab
⋅
Analysis of the APT31 Indictment RAWDOOR APT31 |
2024-04-13
⋅
cyber5w
⋅
Analysis of malicious Microsoft office macros AsyncRAT Ave Maria |
2024-04-08
⋅
0x0d4y
⋅
IcedID – Technical Analysis of an IcedID Lightweight x64 DLL IcedID |
2024-04-07
⋅
cyber5w
⋅
Gafgyt Backdoor Analysis Bashlite |
2024-04-04
⋅
Microsoft
⋅
China tests US voter fault lines and ramps AI content to boost its geopolitical interests |
2024-04-01
⋅
Twitter (@embee_research)
⋅
Passive DNS For Phishing Link Analysis - Identifying 36 Latrodectus Domains With Historical Records and 302 Redirects Latrodectus |
2024-04-01
⋅
Microsoft
⋅
Same targets, new playbooks: East Asia threat actors employ unique methods |
2024-04-01
⋅
Github (amlweems)
⋅
Analysis Repo with honeypot and backdoor patch for xzbot xzbot |
2024-04-01
⋅
ThreatMon
⋅
RisePro Stealer Malware Analysis Report RisePro |
2024-03-30
⋅
Github (smx-smx)
⋅
Gist with XZ Backdoor analysis xzbot |
2024-03-29
⋅
Github (thesamsam)
⋅
Gist with XZ Backdoor analysis xzbot |
2024-03-29
⋅
Github (VenzoV)
⋅
GCleaner analysis with BinaryNinja GCleaner |
2024-03-26
⋅
Medium zyadlzyatsoc
⋅
Comprehensive Analysis of EMOTET Malware: Part 1 Emotet |
2024-03-26
⋅
EchoCTI
⋅
Agent Tesla Technical Analysis Report Agent Tesla |
2024-03-25
⋅
ANY.RUN
⋅
Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough 404 Keylogger GaboonGrabber |
2024-03-25
⋅
iVerify
⋅
Clipping Wings: Our Analysis of a Pegasus Spyware Sample Chrysaor |