Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-17splunkSplunk Threat Research Team
LNK or Swim: Analysis & Simulation of Recent LNK Phishing
2024-06-15Medium b.magnezi0xMrMagnezi
Malware Analysis FormBook
Formbook
2024-06-12GoogleGoogle Threat Analysis Group, Mandiant
Insights on Cyber Threats Targeting Users and Enterprises in Brazil
TraderTraitor
2024-06-10ZscalerManisha Ramcharan Prajapati, Muhammed Irfan V A
Technical Analysis of the Latest Variant of ValleyRAT
ValleyRAT
2024-06-06CrowdStrikeAlexandru Dinu, Dragoș Corlătescu, Mihaela Găman, Paul Sumedrea
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis
2024-06-06Medium b.magnezi0xMrMagnezi
Agent Tesla Analysis
Agent Tesla
2024-06-06Medium b.magnezi0xMrMagnezi
Remcos RAT Analysis
Remcos
2024-06-05QuoIntelligenceAlixia Clarisse Rutayisire
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats
Dragonbridge
2024-06-05SSTICCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Video)
FlowCloud
2024-06-05SekoiaCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Paper)
FlowCloud
2024-06-05SekoiaCharles Meslay
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides)
FlowCloud
2024-06-03CyfoxIdan Malihi
BiBi Wiper: A Malware Analysis Amidst the Israel-Hamas-ISIS Conflict
BiBi
2024-06-03Binary DefenseBinary Defense, Shannon Mong
Wineloader – Analysis of the Infection Chain
WINELOADER
2024-05-28ReliaquestRELIAQUEST THREAT RESEARCH TEAM
BlackSuit Attack Analysis
BlackSuit
2024-05-26ZW01fMohamed Ezat
QakBOT v5 Deep Malware Analysis
QakBot
2024-05-16AhnLabASEC
Analysis of APT attack cases targeting domestic companies using Dora RAT (Andariel Group)
2024-05-14Bern University of Applied ScienceBenjamin Fehrensen, Dominic Schmutz, Robin Rapp
Forensic analysis of hook Android malware
Hook
2024-05-10Qianxin Threat Intelligence CenterThreat Intelligence Center
Recruitment trap for blockchain practitioners: Analysis of suspected Lazarus (APT-Q-1) stealing operations
BeaverTail
2024-05-10ElasticCyril François, Samir Bousseaden
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Four
Remcos
2024-05-08Medium (montysecurity)montysecurity
From OSINT to Disk: Wave Stealer Analysis
Wave Stealer