Click here to download all references as Bib-File.•
| 2024-09-06
⋅
splunk
⋅
Handala’s Wiper: Threat Analysis and Detections Handala Hatef Handala |
| 2024-09-04
⋅
ANY.RUN
⋅
AZORult Malware: Technical Analysis Azorult |
| 2024-08-28
⋅
ESET Research
⋅
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office SpyGrace |
| 2024-08-28
⋅
ESET Research
⋅
ESET Research: Spy group exploits WPS Office zero day; analysis uncovers a second vulnerability SpyGrace |
| 2024-08-22
⋅
S2W Inc.
⋅
Analysis of the North Korea-backed puNK-003’s Lilith RAT ported to AutoIt Script Lilith puNK-003 |
| 2024-08-21
⋅
Zscaler
⋅
Technical Analysis of Copybara Copybara |
| 2024-08-20
⋅
ThreatMon
⋅
CyberVolk Ransomware Technical Malware Analysis Report |
| 2024-08-09
⋅
BreachNova
⋅
Full analysis on NJRAT NjRAT |
| 2024-08-07
⋅
ThreatMon
⋅
AzzaSec Ransomware Technical Malware Analysis HiddenTear |
| 2024-07-28
⋅
cyber5w
⋅
CyberGate Technical Analysis CyberGate |
| 2024-07-25
⋅
TEHTRIS
⋅
Daolpu Infostealer: Full analysis of the latest malware exploited post CrowdStrike outage Daolpu |
| 2024-07-15
⋅
ThreatMon
⋅
Kematian Stealer Technical Malware Analysis Kematian Stealer |
| 2024-07-14
⋅
Medium b.magnezi
⋅
Malware Analysis - Rhadamanthys Rhadamanthys |
| 2024-07-11
⋅
NCSC Switzerland
⋅
Brief technical analysis of the "Poseidon Stealer" malware Poseidon Stealer |
| 2024-06-30
⋅
ZW01f
⋅
Deep Analysis of Snake (404 keylogger) 404 Keylogger |
| 2024-06-17
⋅
splunk
⋅
LNK or Swim: Analysis & Simulation of Recent LNK Phishing |
| 2024-06-15
⋅
Medium b.magnezi
⋅
Malware Analysis FormBook Formbook |
| 2024-06-12
⋅
Google
⋅
Insights on Cyber Threats Targeting Users and Enterprises in Brazil TraderTraitor |
| 2024-06-10
⋅
Zscaler
⋅
Technical Analysis of the Latest Variant of ValleyRAT ValleyRAT |
| 2024-06-06
⋅
CrowdStrike
⋅
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis |