Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-21DeepInstinctAsaf Gilboa, Simon Kenin
What is Arid Gopher? An Analysis of a New, Never-Before-Seen Malware Variant
Arid Gopher AridHelper
2022-03-15cybleCyble
Deep Dive Analysis - Pandora Ransomware
Pandora Rook
2022-03-11Cyble
New Wiper Malware Attacking Russia: Deep-Dive Into RURansom Malware
RURansom
2022-03-03CloudsekAnandeshwar Unnikrishnan, Deepanjli Paulraj
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
HermeticWiper
2022-03-03Medium s2wlabJiho Kim
Deep Analysis of Redline Stealer: Leaked Credential with WCF
RedLine Stealer
2022-03-02Cluster25Cluster25
Conti's Source Code: Deep-Dive Into
Conti
2022-03-01DeepInstinctIdo Kringel
What is HermeticWiper – An Analysis of the Malware and Larger Threat Landscape in the Russian Ukrainian War
HermeticWiper
2022-02-24ZscalerDeepen Desai
HermeticWiper & resurgence of targeted attacks on Ukraine
HermeticWiper
2022-02-23AdvIntelVitali Kremez, Yelisey Boguslavskiy
24 Hours From Log4Shell to Local Admin: Deep-Dive Into Conti Gang Attack on Fortune 500 (DFIR)
Cobalt Strike Conti
2022-02-06Github (eln0ty)Abdallah Elnoty
Deep Analysis of Vidar Information Stealer
Vidar
2022-01-24Kryptos LogicKryptos Logic Vantage Team
Deep Dive into Trickbot's Web Injection
TrickBot
2022-01-21MalGamyGameel Ali
Deep Analysis Agent Tesla Malware
Agent Tesla
2022-01-21binarlyBinarly Team
A deeper UEFI dive into MoonBounce
MoonBounce
2022-01-20CybleincCyble
Deep Dive Into Ragnar_locker Ransomware Gang
RagnarLocker
2022-01-20ZscalerSahil Antil, Sudeep Singh
New espionage attack by Molerats APT targeting users in the Middle East
Spark
2022-01-17Trend MicroCedric Pernet, Daniel Lunghi, Gloria Chen, Jaromír Hořejší, Joseph Chen, Kenney Lu
Delving Deep: An Analysis of Earth Lusca’s Operations
BIOPASS Cobalt Strike FunnySwitch JuicyPotato ShadowPad Winnti Earth Lusca
2022-01-12MalGamy
Deep analysis agent tesla malware
Agent Tesla
2022-01-07CloudsekAnandeshwar Unnikrishnan, Deepanjli Paulraj
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)
Blister
2022-01-07Bill Demirkapi's BlogBill Demirkapi
Unpacking CVE-2021-40444: A Deep Technical Analysis of an Office RCE Exploit
2022-01-03Dee
Tweet on a live C2 panel for Mint stealer
MintStealer