Click here to download all references as Bib-File.•
| 2024-10-28
⋅
Google
⋅
Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives CraxsRAT Pronsis Loader PureLogs Stealer |
| 2024-10-28
⋅
Medium shaddy43
⋅
Emotet Malware Analysis Emotet |
| 2024-10-23
⋅
ANY.RUN
⋅
DarkComet RAT: Technical Analysis of Attack Chain DarkComet |
| 2024-10-22
⋅
NCSC UK
⋅
Malware Analysis Report: Pigmy Goat PigmyGoat |
| 2024-10-22
⋅
Airbus
⋅
Incident Response: Analysis of recent version of BRC4 Brute Ratel C4 |
| 2024-10-17
⋅
Github (ssrdio)
⋅
Analysis of BeaverTail & InvisibleFerret activity BeaverTail InvisibleFerret |
| 2024-10-16
⋅
ThreatMon
⋅
X-ZIGZAG Technical Malware Analysis Report AsyncRAT X-ZIGZAG |
| 2024-10-15
⋅
⋅
Weixin
⋅
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia Unidentified 117 (Donot Loader) |
| 2024-10-11
⋅
Nextron Systems
⋅
In-Depth Analysis of Lynx Ransomware Lynx |
| 2024-10-10
⋅
NCSC Switzerland
⋅
Brief technical analysis of the "Gorilla" botnet Gorilla Gorilla |
| 2024-10-10
⋅
Zscaler
⋅
Technical Analysis of DarkVision RAT DarkVision RAT |
| 2024-10-06
⋅
Google
⋅
Caught in the wild - Past, present and future |
| 2024-10-05
⋅
Malware Analysis - Lumma Stealer Lumma Stealer |
| 2024-10-04
⋅
Memory Forensic
⋅
Inside Cridex - Memory Analysis Case Study Feodo |
| 2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 2 Stealc |
| 2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 1 Stealc |
| 2024-10-03
⋅
Lexfo
⋅
StealC Malware Analysis Part 3 Stealc |
| 2024-10-02
⋅
ThreatMon
⋅
Amnesia Stealer Technical Malware Analysis Report BlankGrabber |
| 2024-10-01
⋅
Streamscan
⋅
Analysis of the Ransomware Nitrogen Nitrogen Ransomware |
| 2024-10-01
⋅
Cybereason
⋅
THREAT ANALYSIS: Beast Ransomware win.beast |