Click here to download all references as Bib-File.•
| 2024-06-17
⋅
splunk
⋅
LNK or Swim: Analysis & Simulation of Recent LNK Phishing |
| 2024-06-15
⋅
Medium b.magnezi
⋅
Malware Analysis FormBook Formbook |
| 2024-06-12
⋅
Google
⋅
Insights on Cyber Threats Targeting Users and Enterprises in Brazil TraderTraitor |
| 2024-06-10
⋅
Zscaler
⋅
Technical Analysis of the Latest Variant of ValleyRAT ValleyRAT |
| 2024-06-06
⋅
CrowdStrike
⋅
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis |
| 2024-06-06
⋅
Medium b.magnezi
⋅
Agent Tesla Analysis Agent Tesla |
| 2024-06-06
⋅
Medium b.magnezi
⋅
Remcos RAT Analysis Remcos |
| 2024-06-05
⋅
QuoIntelligence
⋅
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats Dragonbridge |
| 2024-06-05
⋅
⋅
SSTIC
⋅
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Video) FlowCloud |
| 2024-06-05
⋅
⋅
Sekoia
⋅
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Paper) FlowCloud |
| 2024-06-05
⋅
⋅
Sekoia
⋅
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides) FlowCloud |
| 2024-06-03
⋅
Cyfox
⋅
BiBi Wiper: A Malware Analysis Amidst the Israel-Hamas-ISIS Conflict BiBi |
| 2024-06-03
⋅
Binary Defense
⋅
Wineloader – Analysis of the Infection Chain WINELOADER |
| 2024-05-28
⋅
Reliaquest
⋅
BlackSuit Attack Analysis BlackSuit |
| 2024-05-26
⋅
ZW01f
⋅
QakBOT v5 Deep Malware Analysis QakBot |
| 2024-05-16
⋅
⋅
AhnLab
⋅
Analysis of APT attack cases targeting domestic companies using Dora RAT (Andariel Group) |
| 2024-05-14
⋅
Bern University of Applied Science
⋅
Forensic analysis of hook Android malware Hook |
| 2024-05-10
⋅
⋅
Qianxin Threat Intelligence Center
⋅
Recruitment trap for blockchain practitioners: Analysis of suspected Lazarus (APT-Q-1) stealing operations BeaverTail |
| 2024-05-10
⋅
Elastic
⋅
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Four Remcos |
| 2024-05-08
⋅
Medium (montysecurity)
⋅
From OSINT to Disk: Wave Stealer Analysis Wave Stealer |