Click here to download all references as Bib-File.•
2024-02-05
⋅
YouTube (John Hammond)
⋅
PikaBot Malware Analysis: Debugging in Visual Studio Pikabot |
2024-02-01
⋅
⋅
Infinitum IT
⋅
DcRat Technical Analysis Report (Paywall) DCRat |
2024-02-01
⋅
YouTube (Embee Research)
⋅
Xworm Malware Analysis - Unravelling Multi-stage Malware with CyberChef and DnSpy XWorm |
2024-02-01
⋅
Securonix
⋅
Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor SUBTLE-PAWS |
2024-01-31
⋅
Stairwell
⋅
Technical analysis: The silent torrent of VileRAT VileRAT EVILNUM |
2024-01-29
⋅
hacked.codes
⋅
Technical analysis of WinRAR zero-day malware and C2 protocol emulation |
2024-01-26
⋅
Trendmicro
⋅
Spot the Difference: An Analysis of the New LODEINFO Campaign by Earth Kasha Anel Cobalt Strike LODEINFO NOOPDOOR |
2024-01-25
⋅
IBM
⋅
Broomstick Analysis Report (IRIS-17079) Broomstick |
2024-01-24
⋅
ITOCHU
⋅
The Endless Struggle Against APT10: Insights from LODEINFO v0.6.6 - v0.7.3 Analysis LODEINFO |
2024-01-18
⋅
Google
⋅
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware RCS SPICA |
2024-01-17
⋅
splunk
⋅
Enter The Gates: An Analysis of the DarkGate AutoIt Loader DarkGate |
2024-01-16
⋅
ANY.RUN
⋅
A Full Analysis of the Pure Malware Family: Unique and Growing Threat PureCrypter PureLogs Stealer |
2024-01-16
⋅
Medium walmartglobaltech
⋅
Keyhole Analysis IcedID Keyhole |
2024-01-16
⋅
S2W LAB Inc.
⋅
Detailed Analysis of DarkGate; Investigating new top-trend backdoor malware DarkGate |
2024-01-15
⋅
nikhilh-20
⋅
NoaBot Botnet - Sandboxing with ELFEN and Analysis NoaBot |
2024-01-13
⋅
YouTube (Embee Research)
⋅
Cobalt Strike Shellcode Analysis and C2 Extraction Cobalt Strike |
2024-01-11
⋅
Forescout
⋅
Clearing the Fog of War – A critical analysis of recent energy sector cyberattacks in Denmark and Ukraine |
2024-01-10
⋅
Medium icebre4ker
⋅
Analysis of an Info Stealer — Chapter 2: The iOS App |
2024-01-09
⋅
0x0d4y
⋅
IcedID – Technical Malware Analysis [Second Stage] IcedID PhotoLoader |
2024-01-08
⋅
YouTube (Embee Research)
⋅
Malware Analysis - Powershell decoding and .NET C2 Extraction (Quasar RAT) Quasar RAT |